General

  • Target

    4723241de3d7c0ffb80517367066d5663e66ce8f4065af83cc0849b9443fdc9c

  • Size

    4.2MB

  • Sample

    240418-z73qjafc29

  • MD5

    89da2b249c24cc3af8ef60d52456628a

  • SHA1

    cb6515276ff9e5f86676722d80d1f91f7a295b0f

  • SHA256

    4723241de3d7c0ffb80517367066d5663e66ce8f4065af83cc0849b9443fdc9c

  • SHA512

    b7127493469d3b24d0aa95908f92a688c1abb090b6320c066d8f0508b0cb005b233c37d7a66603ae84ffea3178edc145541e103b2838e593651f2833ffdcaea5

  • SSDEEP

    98304:VE7lQOK92mSkMx0uRuUtm+5cJ+tc7Yu6a+bDYcFZ:VEJQO62+MiqoYu6a+bDZ

Malware Config

Targets

    • Target

      4723241de3d7c0ffb80517367066d5663e66ce8f4065af83cc0849b9443fdc9c

    • Size

      4.2MB

    • MD5

      89da2b249c24cc3af8ef60d52456628a

    • SHA1

      cb6515276ff9e5f86676722d80d1f91f7a295b0f

    • SHA256

      4723241de3d7c0ffb80517367066d5663e66ce8f4065af83cc0849b9443fdc9c

    • SHA512

      b7127493469d3b24d0aa95908f92a688c1abb090b6320c066d8f0508b0cb005b233c37d7a66603ae84ffea3178edc145541e103b2838e593651f2833ffdcaea5

    • SSDEEP

      98304:VE7lQOK92mSkMx0uRuUtm+5cJ+tc7Yu6a+bDYcFZ:VEJQO62+MiqoYu6a+bDZ

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing artifacts associated with disabling Widnows Defender

    • Detects executables referencing many varying, potentially fake Windows User-Agents

    • Modifies boot configuration data using bcdedit

    • UPX dump on OEP (original entry point)

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks