General
-
Target
32a14ff5e71f7370ae246f27c87a811140dee7f6176421f33b4c01014093473e
-
Size
4.1MB
-
Sample
240516-2v8gcsch22
-
MD5
cf8e8fb6bcb50891cc9db0107dda2f91
-
SHA1
84f9b4e02670dbc7e0a6890b32875771353e5a1a
-
SHA256
32a14ff5e71f7370ae246f27c87a811140dee7f6176421f33b4c01014093473e
-
SHA512
68e463623cf0aa9cf3bef0d9d32b4a279a3ce9c594d09b25ce064835d4c7ce38a7b966cf041a7719038e98cd4c504eb0022fe55ade2ff0c68a58284ee3df0758
-
SSDEEP
98304:WPFu/y1+yoTqcgb4Drvh1MQFUVtbPVcs2Idg/v1:J6QywU4f51MQWVtbdHxSv1
Static task
static1
Behavioral task
behavioral1
Sample
32a14ff5e71f7370ae246f27c87a811140dee7f6176421f33b4c01014093473e.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
32a14ff5e71f7370ae246f27c87a811140dee7f6176421f33b4c01014093473e
-
Size
4.1MB
-
MD5
cf8e8fb6bcb50891cc9db0107dda2f91
-
SHA1
84f9b4e02670dbc7e0a6890b32875771353e5a1a
-
SHA256
32a14ff5e71f7370ae246f27c87a811140dee7f6176421f33b4c01014093473e
-
SHA512
68e463623cf0aa9cf3bef0d9d32b4a279a3ce9c594d09b25ce064835d4c7ce38a7b966cf041a7719038e98cd4c504eb0022fe55ade2ff0c68a58284ee3df0758
-
SSDEEP
98304:WPFu/y1+yoTqcgb4Drvh1MQFUVtbPVcs2Idg/v1:J6QywU4f51MQWVtbdHxSv1
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1