General

  • Target

    9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.bin

  • Size

    4.1MB

  • Sample

    240518-gje1fsed7y

  • MD5

    b1bccbb9a72165c7f6571e7f8f7af7f4

  • SHA1

    179ebdc9957e6150071b091fc6a0d70e2cbf91fd

  • SHA256

    9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f

  • SHA512

    d722315fa7b3b2e79587e7a744692b70dac9da65f9b3477dedfc147ad9bac558d0d94b46c86485413cbb0561881b70d7eb34f2b4094f94d40e72d7ce3957d954

  • SSDEEP

    98304:8xfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvJ:qRrVrv4XbNRWhj2o9k8f3CspGvJ

Malware Config

Targets

    • Target

      9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f.bin

    • Size

      4.1MB

    • MD5

      b1bccbb9a72165c7f6571e7f8f7af7f4

    • SHA1

      179ebdc9957e6150071b091fc6a0d70e2cbf91fd

    • SHA256

      9c59370779e658107074f5d3b3467ffd982be68d1923321c908cda0757e65c7f

    • SHA512

      d722315fa7b3b2e79587e7a744692b70dac9da65f9b3477dedfc147ad9bac558d0d94b46c86485413cbb0561881b70d7eb34f2b4094f94d40e72d7ce3957d954

    • SSDEEP

      98304:8xfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvJ:qRrVrv4XbNRWhj2o9k8f3CspGvJ

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks