General
-
Target
1f9a743b98b5e4ebd5ad2d904d56652154f889ffb6e6b11b4bc5ccfc6802b114
-
Size
4.5MB
-
Sample
240826-ybtmba1hpd
-
MD5
0bd41ce845674d14d50ebc9af6bcbae6
-
SHA1
7a1f0f65b4634fabaeb1f2150652909f5ae5b719
-
SHA256
1f9a743b98b5e4ebd5ad2d904d56652154f889ffb6e6b11b4bc5ccfc6802b114
-
SHA512
dbac8536501612591548f161e811d9ad4f44e3a1fd722b34d5981f6f20a3c5ca2770525f90f507531e3f8a155bd40ca91d0de0e609a79189565133b6a204b57c
-
SSDEEP
98304:yWPDyUF0PxzNSPwCgo8An1PUGpL4gFhmZwLcA4nOv1uKrQsK:x3uNNS+oJ9HpL4gFhmCYbnOvMIK
Static task
static1
Behavioral task
behavioral1
Sample
1f9a743b98b5e4ebd5ad2d904d56652154f889ffb6e6b11b4bc5ccfc6802b114.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1f9a743b98b5e4ebd5ad2d904d56652154f889ffb6e6b11b4bc5ccfc6802b114.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
1f9a743b98b5e4ebd5ad2d904d56652154f889ffb6e6b11b4bc5ccfc6802b114
-
Size
4.5MB
-
MD5
0bd41ce845674d14d50ebc9af6bcbae6
-
SHA1
7a1f0f65b4634fabaeb1f2150652909f5ae5b719
-
SHA256
1f9a743b98b5e4ebd5ad2d904d56652154f889ffb6e6b11b4bc5ccfc6802b114
-
SHA512
dbac8536501612591548f161e811d9ad4f44e3a1fd722b34d5981f6f20a3c5ca2770525f90f507531e3f8a155bd40ca91d0de0e609a79189565133b6a204b57c
-
SSDEEP
98304:yWPDyUF0PxzNSPwCgo8An1PUGpL4gFhmZwLcA4nOv1uKrQsK:x3uNNS+oJ9HpL4gFhmCYbnOvMIK
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1