General

  • Target

    4252b7756ffee5f8ccfcc2ec3b859a57b4cc7cdfe7933b64b2889966ce2d7184

  • Size

    4.1MB

  • Sample

    240515-z7tsmach25

  • MD5

    7ba4aa6ec265425a94c02c46f3abe8f4

  • SHA1

    457a942b084e8ba03470d424a72a22139df548c7

  • SHA256

    4252b7756ffee5f8ccfcc2ec3b859a57b4cc7cdfe7933b64b2889966ce2d7184

  • SHA512

    a31a0b836325089b0ab2ce9e69b29873dbf1a5fed291f9a59b6d0de64a2b294f46697f49b85a7e7cd9d66ace541819f8b05b8feb690d9fc0eb5ad3d5e3571cfd

  • SSDEEP

    98304:fM/EmSBi2U836aQ7T+NOHAd2U4SvMS0Qb1S3aNOYAF0BRB40OFsQ:fR5hU83ZQZH62N+Mm1SqPK0thQ

Malware Config

Targets

    • Target

      4252b7756ffee5f8ccfcc2ec3b859a57b4cc7cdfe7933b64b2889966ce2d7184

    • Size

      4.1MB

    • MD5

      7ba4aa6ec265425a94c02c46f3abe8f4

    • SHA1

      457a942b084e8ba03470d424a72a22139df548c7

    • SHA256

      4252b7756ffee5f8ccfcc2ec3b859a57b4cc7cdfe7933b64b2889966ce2d7184

    • SHA512

      a31a0b836325089b0ab2ce9e69b29873dbf1a5fed291f9a59b6d0de64a2b294f46697f49b85a7e7cd9d66ace541819f8b05b8feb690d9fc0eb5ad3d5e3571cfd

    • SSDEEP

      98304:fM/EmSBi2U836aQ7T+NOHAd2U4SvMS0Qb1S3aNOYAF0BRB40OFsQ:fR5hU83ZQZH62N+Mm1SqPK0thQ

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables containing artifacts associated with disabling Widnows Defender

    • Detects executables referencing many varying, potentially fake Windows User-Agents

    • UPX dump on OEP (original entry point)

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks