General

  • Target

    2da879b1bc0247755178cd03a6eac747182811967f68400fcbcf6da642023578.exe

  • Size

    4.1MB

  • Sample

    240519-l5k6tadc95

  • MD5

    0acfd9a919726a481ca756f6abad0ac0

  • SHA1

    c142555a1091b14516a5a43d829fbdf88ca5b14a

  • SHA256

    2da879b1bc0247755178cd03a6eac747182811967f68400fcbcf6da642023578

  • SHA512

    11f3014889f675ae70d2d016a1ffca0686b59ed1020a91ba7660b7a6096abaae001d463e2297571eeba076994fcb8d669586e468ecccfa7e97d52a89177e5ceb

  • SSDEEP

    98304:1/lx2VB4FLDQS1OmkYbRsTncIxTvyO2P5x7YbDUU80:FlgkYS1OmbburVLyO2P5x7Yb4e

Malware Config

Targets

    • Target

      2da879b1bc0247755178cd03a6eac747182811967f68400fcbcf6da642023578.exe

    • Size

      4.1MB

    • MD5

      0acfd9a919726a481ca756f6abad0ac0

    • SHA1

      c142555a1091b14516a5a43d829fbdf88ca5b14a

    • SHA256

      2da879b1bc0247755178cd03a6eac747182811967f68400fcbcf6da642023578

    • SHA512

      11f3014889f675ae70d2d016a1ffca0686b59ed1020a91ba7660b7a6096abaae001d463e2297571eeba076994fcb8d669586e468ecccfa7e97d52a89177e5ceb

    • SSDEEP

      98304:1/lx2VB4FLDQS1OmkYbRsTncIxTvyO2P5x7YbDUU80:FlgkYS1OmbburVLyO2P5x7Yb4e

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks