General

  • Target

    b92d002fb2ed3ae2ddb1c207f44917156bae55c032589abbcbd1e63bd1d2d770.exe

  • Size

    4.1MB

  • Sample

    240520-f6pbzadf67

  • MD5

    4c13a7b9fa15748f918c7ebc8692feb7

  • SHA1

    a83a2575e3a1a16266e9ce27832a1850347aeb74

  • SHA256

    b92d002fb2ed3ae2ddb1c207f44917156bae55c032589abbcbd1e63bd1d2d770

  • SHA512

    bcf0be98fc76abeec8989bd71251a3f95708fc1007b4a0518b2e20b74c2c7d1b8448040762609cd80261871bc1565c9e6b62342b77b235fc3bbe4d9a4a81dc11

  • SSDEEP

    98304:lH+PiUxpnK5pcCD6RLXH4DRMjOnEmJ5mWZ44js55cU5wvI2b:lH+PiSfw6Rz4ejOEAZ44S5J5ww2b

Malware Config

Targets

    • Target

      b92d002fb2ed3ae2ddb1c207f44917156bae55c032589abbcbd1e63bd1d2d770.exe

    • Size

      4.1MB

    • MD5

      4c13a7b9fa15748f918c7ebc8692feb7

    • SHA1

      a83a2575e3a1a16266e9ce27832a1850347aeb74

    • SHA256

      b92d002fb2ed3ae2ddb1c207f44917156bae55c032589abbcbd1e63bd1d2d770

    • SHA512

      bcf0be98fc76abeec8989bd71251a3f95708fc1007b4a0518b2e20b74c2c7d1b8448040762609cd80261871bc1565c9e6b62342b77b235fc3bbe4d9a4a81dc11

    • SSDEEP

      98304:lH+PiUxpnK5pcCD6RLXH4DRMjOnEmJ5mWZ44js55cU5wvI2b:lH+PiSfw6Rz4ejOEAZ44S5J5ww2b

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks