General
-
Target
144506f4b81d7f56225ac49ff447c49a56b48f943a3a880b0e83f96caae21028.bin.bin.exe
-
Size
4.1MB
-
Sample
240518-m5lm1sgc24
-
MD5
da57e4cfdacfc7c09fee333949a64997
-
SHA1
14fe352185eb6fb12fb20a103c2a118230dab52d
-
SHA256
144506f4b81d7f56225ac49ff447c49a56b48f943a3a880b0e83f96caae21028
-
SHA512
aec750592d703509b7173b4660fe5d8f1c66a0f746d4c135f223cd4ad56ade3e52cece93b8d0532e6cb91945640c221bed935241bade05bd24cf49867cdd6a7b
-
SSDEEP
98304:vQx32Mq02zAeaet/0/YHlEVnWsL/fnVsJseCa8CK6QwXNx08FP:4x32Mq02zAeLCVnWszfVfeCa8CLXv/1
Static task
static1
Behavioral task
behavioral1
Sample
144506f4b81d7f56225ac49ff447c49a56b48f943a3a880b0e83f96caae21028.bin.bin.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
144506f4b81d7f56225ac49ff447c49a56b48f943a3a880b0e83f96caae21028.bin.bin.exe
-
Size
4.1MB
-
MD5
da57e4cfdacfc7c09fee333949a64997
-
SHA1
14fe352185eb6fb12fb20a103c2a118230dab52d
-
SHA256
144506f4b81d7f56225ac49ff447c49a56b48f943a3a880b0e83f96caae21028
-
SHA512
aec750592d703509b7173b4660fe5d8f1c66a0f746d4c135f223cd4ad56ade3e52cece93b8d0532e6cb91945640c221bed935241bade05bd24cf49867cdd6a7b
-
SSDEEP
98304:vQx32Mq02zAeaet/0/YHlEVnWsL/fnVsJseCa8CK6QwXNx08FP:4x32Mq02zAeLCVnWszfVfeCa8CLXv/1
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1