General
-
Target
bd379cc18853b19c52c201fc442b00413250683b530e9ce16cbded62fb8aa896
-
Size
4.2MB
-
Sample
240418-23ybcshe45
-
MD5
fd0c87de5f3b09ed3586a6754199bdf0
-
SHA1
aad43fff713dacf8deead3025c794ffa3ef41ada
-
SHA256
bd379cc18853b19c52c201fc442b00413250683b530e9ce16cbded62fb8aa896
-
SHA512
f8ad0a1bf20b12a5c17706afbb1208554ba96249ec4ed98323cedc079a6643f6858fddab4b115890f4451d9aac537c606246e39812df99a31979dfa25f05061c
-
SSDEEP
98304:mz7Cg0ld9bGpeFIidtQ9zICqBAsCsR7hN5aqRYTU7P:M7NcfZtQ9LJEd3aOYT+P
Static task
static1
Behavioral task
behavioral1
Sample
bd379cc18853b19c52c201fc442b00413250683b530e9ce16cbded62fb8aa896.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
bd379cc18853b19c52c201fc442b00413250683b530e9ce16cbded62fb8aa896
-
Size
4.2MB
-
MD5
fd0c87de5f3b09ed3586a6754199bdf0
-
SHA1
aad43fff713dacf8deead3025c794ffa3ef41ada
-
SHA256
bd379cc18853b19c52c201fc442b00413250683b530e9ce16cbded62fb8aa896
-
SHA512
f8ad0a1bf20b12a5c17706afbb1208554ba96249ec4ed98323cedc079a6643f6858fddab4b115890f4451d9aac537c606246e39812df99a31979dfa25f05061c
-
SSDEEP
98304:mz7Cg0ld9bGpeFIidtQ9zICqBAsCsR7hN5aqRYTU7P:M7NcfZtQ9LJEd3aOYT+P
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1