General

  • Target

    3b7272d0f31250926d9fd53b7c46830bc9fa9a2d750380ed92739b7883191798.exe

  • Size

    4.2MB

  • Sample

    240313-cn8q4saa3s

  • MD5

    bfeb146089595a1526d77ecb77ed1585

  • SHA1

    b68e75319b9a2870d7958f8099d66e11cef628de

  • SHA256

    3b7272d0f31250926d9fd53b7c46830bc9fa9a2d750380ed92739b7883191798

  • SHA512

    6b302b989a056933e763c0a04c943a42fc20e402122078e6858fb6b02ad0a78a0f84d35b23ab43999398f5b4a08604a726a75add044e8e80c0ba081cdfa9d932

  • SSDEEP

    98304:cN8JqIbPE4i7N72Cg8mUyrSElplXZvQ5t1MxuFIGPlSRtUzIvi3ZFCDZ:fJLbPrk2Cg8mBflpliHxFbSbUE6LCt

Malware Config

Targets

    • Target

      3b7272d0f31250926d9fd53b7c46830bc9fa9a2d750380ed92739b7883191798.exe

    • Size

      4.2MB

    • MD5

      bfeb146089595a1526d77ecb77ed1585

    • SHA1

      b68e75319b9a2870d7958f8099d66e11cef628de

    • SHA256

      3b7272d0f31250926d9fd53b7c46830bc9fa9a2d750380ed92739b7883191798

    • SHA512

      6b302b989a056933e763c0a04c943a42fc20e402122078e6858fb6b02ad0a78a0f84d35b23ab43999398f5b4a08604a726a75add044e8e80c0ba081cdfa9d932

    • SSDEEP

      98304:cN8JqIbPE4i7N72Cg8mUyrSElplXZvQ5t1MxuFIGPlSRtUzIvi3ZFCDZ:fJLbPrk2Cg8mBflpliHxFbSbUE6LCt

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing artifacts associated with disabling Widnows Defender

    • Detects executables referencing many varying, potentially fake Windows User-Agents

    • UPX dump on OEP (original entry point)

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks