General

  • Target

    e05339656af35651a50ea1547a9b81cf_JaffaCakes118

  • Size

    3.7MB

  • Sample

    240914-q8xq8sxfnf

  • MD5

    e05339656af35651a50ea1547a9b81cf

  • SHA1

    d7395c16e5e461cc94f873a500cb241dc42cbaf5

  • SHA256

    b756dfe8f2f0154eee5c44786331e743aae7abd71b340157f4c9f050e764e2d9

  • SHA512

    12ec8d5f8a1daf3a6ee863401e9fffc48cea85141c741908400cd5bce01d303f70718ed38e763557fed27f9017af4ae8901287da139dd63c3f2ae88f12da0b78

  • SSDEEP

    49152:rKPNfOD/Xm8sESaqwSs2TBuZc/DnfW9uIB00z31kjQ+ViDooB5KH9vMM4rp7Zy7x:2PNWK8n7CfW9rVi+cHpcq7mE

Malware Config

Targets

    • Target

      e05339656af35651a50ea1547a9b81cf_JaffaCakes118

    • Size

      3.7MB

    • MD5

      e05339656af35651a50ea1547a9b81cf

    • SHA1

      d7395c16e5e461cc94f873a500cb241dc42cbaf5

    • SHA256

      b756dfe8f2f0154eee5c44786331e743aae7abd71b340157f4c9f050e764e2d9

    • SHA512

      12ec8d5f8a1daf3a6ee863401e9fffc48cea85141c741908400cd5bce01d303f70718ed38e763557fed27f9017af4ae8901287da139dd63c3f2ae88f12da0b78

    • SSDEEP

      49152:rKPNfOD/Xm8sESaqwSs2TBuZc/DnfW9uIB00z31kjQ+ViDooB5KH9vMM4rp7Zy7x:2PNWK8n7CfW9rVi+cHpcq7mE

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks