General

  • Target

    050c7bdef499a3aeecaa3bca43950f540c835b41a4b0d321f916e415ce564bca.exe

  • Size

    4.1MB

  • Sample

    240606-mc4ywsch3x

  • MD5

    58aeec23aa477acc489ca29fc8222e5e

  • SHA1

    fd189a7331274779548164e9a5c19f7c82bb287d

  • SHA256

    050c7bdef499a3aeecaa3bca43950f540c835b41a4b0d321f916e415ce564bca

  • SHA512

    4f6ce8c769d27fa6b1b2c640ba22c995eabcec9c530221678d60a356c80c43a9a8eb47bafb16d3dc18f9f4d352fc5cf334d6d0076ac87251ee121a446ffe2176

  • SSDEEP

    98304:mJsMjtvpLhBsrANyl+HA3P3+ZY1+eQIMXjectPnUWuRnMm8CYQO5:mWgDBsKdHAWZM+VzNxnUpRnkRj

Malware Config

Targets

    • Target

      050c7bdef499a3aeecaa3bca43950f540c835b41a4b0d321f916e415ce564bca.exe

    • Size

      4.1MB

    • MD5

      58aeec23aa477acc489ca29fc8222e5e

    • SHA1

      fd189a7331274779548164e9a5c19f7c82bb287d

    • SHA256

      050c7bdef499a3aeecaa3bca43950f540c835b41a4b0d321f916e415ce564bca

    • SHA512

      4f6ce8c769d27fa6b1b2c640ba22c995eabcec9c530221678d60a356c80c43a9a8eb47bafb16d3dc18f9f4d352fc5cf334d6d0076ac87251ee121a446ffe2176

    • SSDEEP

      98304:mJsMjtvpLhBsrANyl+HA3P3+ZY1+eQIMXjectPnUWuRnMm8CYQO5:mWgDBsKdHAWZM+VzNxnUpRnkRj

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks