General
-
Target
cda32915ca02358f42ae13e0e99d92b5352f12e89bf80a69faa580847dabe116.bin
-
Size
4.1MB
-
Sample
240518-qqa5hsdf67
-
MD5
14d082c1ac97b32bfb3155608a48fa5b
-
SHA1
2c36c7089c8c0a7064ba58e931b9de0292f2ca43
-
SHA256
cda32915ca02358f42ae13e0e99d92b5352f12e89bf80a69faa580847dabe116
-
SHA512
f761f708648dff6f9c72d0266a11579fd2a60a74c4748bd89e4fed5810089e158a9ebd35a7b656a4bb9ca4a20efd3fd08c81aeb923d3d95a8d5fb9f5a85c8ea7
-
SSDEEP
98304:/Qx32Mq02zAeaet/0/YHlEVnWsL/fnVsJseCa8CK6QwXNx08Fed:Ix32Mq02zAeLCVnWszfVfeCa8CLXv/kd
Static task
static1
Behavioral task
behavioral1
Sample
cda32915ca02358f42ae13e0e99d92b5352f12e89bf80a69faa580847dabe116.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
cda32915ca02358f42ae13e0e99d92b5352f12e89bf80a69faa580847dabe116.bin
-
Size
4.1MB
-
MD5
14d082c1ac97b32bfb3155608a48fa5b
-
SHA1
2c36c7089c8c0a7064ba58e931b9de0292f2ca43
-
SHA256
cda32915ca02358f42ae13e0e99d92b5352f12e89bf80a69faa580847dabe116
-
SHA512
f761f708648dff6f9c72d0266a11579fd2a60a74c4748bd89e4fed5810089e158a9ebd35a7b656a4bb9ca4a20efd3fd08c81aeb923d3d95a8d5fb9f5a85c8ea7
-
SSDEEP
98304:/Qx32Mq02zAeaet/0/YHlEVnWsL/fnVsJseCa8CK6QwXNx08Fed:Ix32Mq02zAeLCVnWszfVfeCa8CLXv/kd
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1