General
-
Target
bc771131a0223522c855864ebc4f00277266f00a1aacb8a980d761d708dd208e
-
Size
4.1MB
-
Sample
240501-3vrpaaag6t
-
MD5
eff998709bedb64e8fbc239784e5005e
-
SHA1
bc14161a5753d61a6c24d5f7e0f285bb0b206788
-
SHA256
bc771131a0223522c855864ebc4f00277266f00a1aacb8a980d761d708dd208e
-
SHA512
2a0a0491a68a1021f599d4c31d3f2147c9bed5630b15946e92e99aad34aea31c203befce77ebd752df8a4e29ec7c19a65fe7850ee2a16680555ae73d32d4817d
-
SSDEEP
98304:7UQRf1wSMtGEuHsx9VAF/BImpXoFDf7ijanB1+UMJMs:7UE1euH+9U2mWZ7rz+ws
Static task
static1
Behavioral task
behavioral1
Sample
bc771131a0223522c855864ebc4f00277266f00a1aacb8a980d761d708dd208e.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
bc771131a0223522c855864ebc4f00277266f00a1aacb8a980d761d708dd208e
-
Size
4.1MB
-
MD5
eff998709bedb64e8fbc239784e5005e
-
SHA1
bc14161a5753d61a6c24d5f7e0f285bb0b206788
-
SHA256
bc771131a0223522c855864ebc4f00277266f00a1aacb8a980d761d708dd208e
-
SHA512
2a0a0491a68a1021f599d4c31d3f2147c9bed5630b15946e92e99aad34aea31c203befce77ebd752df8a4e29ec7c19a65fe7850ee2a16680555ae73d32d4817d
-
SSDEEP
98304:7UQRf1wSMtGEuHsx9VAF/BImpXoFDf7ijanB1+UMJMs:7UE1euH+9U2mWZ7rz+ws
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1