General
-
Target
1f3ece86748a34ac265f9a743f0dca2848ebc609466a7403ac88d048acb0b6e0
-
Size
4.3MB
-
Sample
241221-tpye7sspgq
-
MD5
6486c505987eecb7dfeb98da225988e6
-
SHA1
6dda733b694de2b154230f80400eab094685b8c1
-
SHA256
1f3ece86748a34ac265f9a743f0dca2848ebc609466a7403ac88d048acb0b6e0
-
SHA512
fa8aa3403c6584a0a6b4300c81404d65fe37ed1d7d7de98784cc03040aafb4da34f97adfbebe374d4ec85de2e75d3b82608ab138d495966e6c4b3317f864d195
-
SSDEEP
98304:PwBvKk0n93ET127UDypvrYP/4rqzG0jfrWTAiHuddFwD:4e9E5DqDasEGUjWL4+
Static task
static1
Behavioral task
behavioral1
Sample
dcbce8ad6056fe2459a1a45a92ddb9299ca5691a05199756e56214890d55cef3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcbce8ad6056fe2459a1a45a92ddb9299ca5691a05199756e56214890d55cef3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
dcbce8ad6056fe2459a1a45a92ddb9299ca5691a05199756e56214890d55cef3
-
Size
4.4MB
-
MD5
30357fb267571b15e233f3fa884a46ca
-
SHA1
834fbb6c08297655f38a23ca5302f856fc3b9ad6
-
SHA256
dcbce8ad6056fe2459a1a45a92ddb9299ca5691a05199756e56214890d55cef3
-
SHA512
71d4addefd70b66889c6279f952a0987111d13a08b2798847a43b55c1887a4c6ed1ecc4ef2d59ecdabd502be99cd6d871fea851ba91a1c1d3f346ff939da3357
-
SSDEEP
98304:l3c8313x9ja+LVxW0vyNL8Jdz0a9yaIuWY9cRb/O:XfG+LfBQhKC/O
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1