General

  • Target

    cdbd1e78b5156b2df0e77dd43797a72f3c40cea4b95baa7620df4f33ffd3c504

  • Size

    4.1MB

  • Sample

    240517-ahdbxagb3w

  • MD5

    c3f2afceda203d159d7a716f04e05eb5

  • SHA1

    af92301ee6c6cf1fa3687874365b808b968bf0d0

  • SHA256

    cdbd1e78b5156b2df0e77dd43797a72f3c40cea4b95baa7620df4f33ffd3c504

  • SHA512

    310cf8fa49a671750529f9c8040a96583e1df4fda7abf541cc51afd7b734a629dfe36d4a9906cd580b83eb0ecacc8378a435f9f5150bdf3f2e9caf35c6fe848c

  • SSDEEP

    98304:cpMzL5+lO9W76PsoCApCyikUKUcOjCi32ayWjPGQw0uKEhKus:cCz0Ow78YApCVkUKUXCi327kurTvhK7

Malware Config

Targets

    • Target

      cdbd1e78b5156b2df0e77dd43797a72f3c40cea4b95baa7620df4f33ffd3c504

    • Size

      4.1MB

    • MD5

      c3f2afceda203d159d7a716f04e05eb5

    • SHA1

      af92301ee6c6cf1fa3687874365b808b968bf0d0

    • SHA256

      cdbd1e78b5156b2df0e77dd43797a72f3c40cea4b95baa7620df4f33ffd3c504

    • SHA512

      310cf8fa49a671750529f9c8040a96583e1df4fda7abf541cc51afd7b734a629dfe36d4a9906cd580b83eb0ecacc8378a435f9f5150bdf3f2e9caf35c6fe848c

    • SSDEEP

      98304:cpMzL5+lO9W76PsoCApCyikUKUcOjCi32ayWjPGQw0uKEhKus:cCz0Ow78YApCVkUKUXCi327kurTvhK7

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks