General
-
Target
cebdf5b7e0feb41c79b0d98f7e53abe9224e062ebe9274bc0586589c8a756f2b
-
Size
4.2MB
-
Sample
240504-2nbttahb33
-
MD5
d47ca66ba7aa9afbec1124eb60dc771b
-
SHA1
789ec5af20b95c1ed3f62f9616440070d996bbad
-
SHA256
cebdf5b7e0feb41c79b0d98f7e53abe9224e062ebe9274bc0586589c8a756f2b
-
SHA512
7d03d5a19812788f7ab4e4efe3be8a3cf2b28ac77a0decbdc58f7822d7ea8d65f0c0e5f1e8822a0e37ca7e59b417a086e6c94b873c199c3abc2600490b319068
-
SSDEEP
98304:lt7eQ0rFIVLc0z4g9YvjqpAtYEkQ/TsxEs7EMhmMkcgx69wR1+wT:l9d0gwYx9yq2OE1uFgzNZx69wR4o
Static task
static1
Behavioral task
behavioral1
Sample
cebdf5b7e0feb41c79b0d98f7e53abe9224e062ebe9274bc0586589c8a756f2b.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
cebdf5b7e0feb41c79b0d98f7e53abe9224e062ebe9274bc0586589c8a756f2b
-
Size
4.2MB
-
MD5
d47ca66ba7aa9afbec1124eb60dc771b
-
SHA1
789ec5af20b95c1ed3f62f9616440070d996bbad
-
SHA256
cebdf5b7e0feb41c79b0d98f7e53abe9224e062ebe9274bc0586589c8a756f2b
-
SHA512
7d03d5a19812788f7ab4e4efe3be8a3cf2b28ac77a0decbdc58f7822d7ea8d65f0c0e5f1e8822a0e37ca7e59b417a086e6c94b873c199c3abc2600490b319068
-
SSDEEP
98304:lt7eQ0rFIVLc0z4g9YvjqpAtYEkQ/TsxEs7EMhmMkcgx69wR1+wT:l9d0gwYx9yq2OE1uFgzNZx69wR4o
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1