General

  • Target

    cdff012f7946988a791c8bf925d8eed8fb510e1dc8311b5b5a29c7189acd152e.bin

  • Size

    4.1MB

  • Sample

    240518-qrbgnsdg28

  • MD5

    09a5fbe77e89b211eda8cf4df226039d

  • SHA1

    00a1f9efc0931ff5c04dd1f067699f91e464b321

  • SHA256

    cdff012f7946988a791c8bf925d8eed8fb510e1dc8311b5b5a29c7189acd152e

  • SHA512

    630d17f9040ee3d79c3eaf5f3eede6b861961534f33dc78f58771b10be5b46ba96303e5907f1d9f5b868e3f65dc354811293eb87c8c81c4d70a832b94cf6abaf

  • SSDEEP

    98304:MxfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvK:6RrVrv4XbNRWhj2o9k8f3CspGvK

Malware Config

Targets

    • Target

      cdff012f7946988a791c8bf925d8eed8fb510e1dc8311b5b5a29c7189acd152e.bin

    • Size

      4.1MB

    • MD5

      09a5fbe77e89b211eda8cf4df226039d

    • SHA1

      00a1f9efc0931ff5c04dd1f067699f91e464b321

    • SHA256

      cdff012f7946988a791c8bf925d8eed8fb510e1dc8311b5b5a29c7189acd152e

    • SHA512

      630d17f9040ee3d79c3eaf5f3eede6b861961534f33dc78f58771b10be5b46ba96303e5907f1d9f5b868e3f65dc354811293eb87c8c81c4d70a832b94cf6abaf

    • SSDEEP

      98304:MxfL9oyIkrku4AJMBJNRxIbk0RddEjk9Pc8cg301s2mGvK:6RrVrv4XbNRWhj2o9k8f3CspGvK

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks