General
-
Target
20240926bbc984e453abf2fe658869b284a52dbfpoetratsnatch
-
Size
8.3MB
-
Sample
240926-xk64bssepm
-
MD5
bbc984e453abf2fe658869b284a52dbf
-
SHA1
67efe0a521434db39b9cc93c714f126d3691a8a3
-
SHA256
74439b64c299dca464dbc4557a4821225567dd301e32c7c367f31c0858e4a7be
-
SHA512
0d39e250e3fe12a8c69b98ffa55935a2b215d08997aa2205408ded8c572a2293829b497658e5b3af9ec70aad88edd04e209359abee6afd71d15f018ce555a170
-
SSDEEP
98304:0kIhs4Oy515t3t/lsWbb0HEY8b/1qhZytTD5iq:0kws4RlzPwOshwN
Behavioral task
behavioral1
Sample
20240926bbc984e453abf2fe658869b284a52dbfpoetratsnatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240926bbc984e453abf2fe658869b284a52dbfpoetratsnatch.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
20240926bbc984e453abf2fe658869b284a52dbfpoetratsnatch
-
Size
8.3MB
-
MD5
bbc984e453abf2fe658869b284a52dbf
-
SHA1
67efe0a521434db39b9cc93c714f126d3691a8a3
-
SHA256
74439b64c299dca464dbc4557a4821225567dd301e32c7c367f31c0858e4a7be
-
SHA512
0d39e250e3fe12a8c69b98ffa55935a2b215d08997aa2205408ded8c572a2293829b497658e5b3af9ec70aad88edd04e209359abee6afd71d15f018ce555a170
-
SSDEEP
98304:0kIhs4Oy515t3t/lsWbb0HEY8b/1qhZytTD5iq:0kws4RlzPwOshwN
-
Glupteba payload
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Modifies boot configuration data using bcdedit
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1