General
-
Target
5124df6b9ede8680fe86ddca93fbe0398d4a89945680d554dbbc8928a66d2b20
-
Size
4.2MB
-
Sample
240429-fmmn2abb23
-
MD5
cc6a04d4869d8bebacfeedc553747292
-
SHA1
985baf2f481c0cfe9126664a00949ea697f8812f
-
SHA256
5124df6b9ede8680fe86ddca93fbe0398d4a89945680d554dbbc8928a66d2b20
-
SHA512
b8e86afe1c91d7fa5ea263e497ce54d93a0f9fadc2dd74cf1f5d4fd0e754cdabb8ac317ccfdca28ef3b2d1927fafbbb272e98146683736ccdc01d9d0972adf38
-
SSDEEP
98304:zkACmlwGsoXusMthX5nnpua2NN0XKOSeI8Ul6HVOyuwfig16:R9lLT+v5npu/DmOeIxi1jfiD
Static task
static1
Behavioral task
behavioral1
Sample
5124df6b9ede8680fe86ddca93fbe0398d4a89945680d554dbbc8928a66d2b20.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
5124df6b9ede8680fe86ddca93fbe0398d4a89945680d554dbbc8928a66d2b20
-
Size
4.2MB
-
MD5
cc6a04d4869d8bebacfeedc553747292
-
SHA1
985baf2f481c0cfe9126664a00949ea697f8812f
-
SHA256
5124df6b9ede8680fe86ddca93fbe0398d4a89945680d554dbbc8928a66d2b20
-
SHA512
b8e86afe1c91d7fa5ea263e497ce54d93a0f9fadc2dd74cf1f5d4fd0e754cdabb8ac317ccfdca28ef3b2d1927fafbbb272e98146683736ccdc01d9d0972adf38
-
SSDEEP
98304:zkACmlwGsoXusMthX5nnpua2NN0XKOSeI8Ul6HVOyuwfig16:R9lLT+v5npu/DmOeIxi1jfiD
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1