General
-
Target
233d0a9054f953119ea58c014c8559b745ece8f2cc16d3673f439f023f93863d
-
Size
4.1MB
-
Sample
240516-2rhfrsce84
-
MD5
b60c570e26b7a8c5623ae564db51f61e
-
SHA1
09bd0c38bf8a6884b4982c63c817077f8d1ac56b
-
SHA256
233d0a9054f953119ea58c014c8559b745ece8f2cc16d3673f439f023f93863d
-
SHA512
d96c2c3a6143d22c3ee72d60bf438f3dced25fe86125c3c75404444394b37b22c64fcccb18ceda4bf469f7bec250b38114d1b01fe3c5f464da2ad49f5a4ad9b3
-
SSDEEP
98304:KLfLmuekyM0n5c1HyRUBBc8n4SZF75ocCX26:SjmXMxwUB28/Zt5olh
Static task
static1
Behavioral task
behavioral1
Sample
233d0a9054f953119ea58c014c8559b745ece8f2cc16d3673f439f023f93863d.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
233d0a9054f953119ea58c014c8559b745ece8f2cc16d3673f439f023f93863d
-
Size
4.1MB
-
MD5
b60c570e26b7a8c5623ae564db51f61e
-
SHA1
09bd0c38bf8a6884b4982c63c817077f8d1ac56b
-
SHA256
233d0a9054f953119ea58c014c8559b745ece8f2cc16d3673f439f023f93863d
-
SHA512
d96c2c3a6143d22c3ee72d60bf438f3dced25fe86125c3c75404444394b37b22c64fcccb18ceda4bf469f7bec250b38114d1b01fe3c5f464da2ad49f5a4ad9b3
-
SSDEEP
98304:KLfLmuekyM0n5c1HyRUBBc8n4SZF75ocCX26:SjmXMxwUB28/Zt5olh
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1