General

  • Target

    2c503fe00f01fdc63e3cfa9d1999282ce0c747909a116d8c9d4d09ca2b48f477

  • Size

    4.1MB

  • Sample

    240519-t3z6ysfg9s

  • MD5

    7c47f4ff30781e6936359f06900fef5a

  • SHA1

    c51f6e7daadfca18ba49c02a27348ee429ac59cf

  • SHA256

    2c503fe00f01fdc63e3cfa9d1999282ce0c747909a116d8c9d4d09ca2b48f477

  • SHA512

    601431e0f5ac03dc1bec29815566247ce47745987a8b443ab85f1b926e36917624b1ee8a1bc3ced0420af301524d0c316b8d530574d363973c9ae0b4c9bf7785

  • SSDEEP

    98304:JvHfbigA34ifkpJZQU0TgaIfW6UkFHwAhDtgwFW+1Z:JvHfb2IifudqhIuUHwAjW+H

Malware Config

Targets

    • Target

      2c503fe00f01fdc63e3cfa9d1999282ce0c747909a116d8c9d4d09ca2b48f477

    • Size

      4.1MB

    • MD5

      7c47f4ff30781e6936359f06900fef5a

    • SHA1

      c51f6e7daadfca18ba49c02a27348ee429ac59cf

    • SHA256

      2c503fe00f01fdc63e3cfa9d1999282ce0c747909a116d8c9d4d09ca2b48f477

    • SHA512

      601431e0f5ac03dc1bec29815566247ce47745987a8b443ab85f1b926e36917624b1ee8a1bc3ced0420af301524d0c316b8d530574d363973c9ae0b4c9bf7785

    • SSDEEP

      98304:JvHfbigA34ifkpJZQU0TgaIfW6UkFHwAhDtgwFW+1Z:JvHfb2IifudqhIuUHwAjW+H

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.