General
-
Target
b4b058688f1dcc66932a8b15c5039dd1426521cd02a746850bb9ce9adf55e7a6.exe
-
Size
4.1MB
-
Sample
240520-frpdesdf2z
-
MD5
809d48296919decb9e35f37b81569f62
-
SHA1
2f0f4c33547ec7f403cbbe7eb58a0fabc28b5ead
-
SHA256
b4b058688f1dcc66932a8b15c5039dd1426521cd02a746850bb9ce9adf55e7a6
-
SHA512
05157c49a30084d497d01820c53f2b252931ea2f5a30a24424274bf94d787e93868132be78b0295006c3a8a3aadd7141b43769dd2aab4f1866a730cb1405af9b
-
SSDEEP
98304:1H+PiUxpnK5pcCD6RLXH4DRMjOnEmJ5mWZ44js55cU5wvI2r:1H+PiSfw6Rz4ejOEAZ44S5J5ww2r
Static task
static1
Behavioral task
behavioral1
Sample
b4b058688f1dcc66932a8b15c5039dd1426521cd02a746850bb9ce9adf55e7a6.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
b4b058688f1dcc66932a8b15c5039dd1426521cd02a746850bb9ce9adf55e7a6.exe
-
Size
4.1MB
-
MD5
809d48296919decb9e35f37b81569f62
-
SHA1
2f0f4c33547ec7f403cbbe7eb58a0fabc28b5ead
-
SHA256
b4b058688f1dcc66932a8b15c5039dd1426521cd02a746850bb9ce9adf55e7a6
-
SHA512
05157c49a30084d497d01820c53f2b252931ea2f5a30a24424274bf94d787e93868132be78b0295006c3a8a3aadd7141b43769dd2aab4f1866a730cb1405af9b
-
SSDEEP
98304:1H+PiUxpnK5pcCD6RLXH4DRMjOnEmJ5mWZ44js55cU5wvI2r:1H+PiSfw6Rz4ejOEAZ44S5J5ww2r
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1