General

  • Target

    JaffaCakes118_036a8c292af78bc2937db49b8d2a85ee12b682c2dc13b87f69057c69a2fbcb12

  • Size

    4.3MB

  • Sample

    241221-wvlppsvrbt

  • MD5

    ebe24bebb37f53cfa1321e3b7919ea1a

  • SHA1

    61769dae7c4963acd8d25170bf8aaa53784940cc

  • SHA256

    036a8c292af78bc2937db49b8d2a85ee12b682c2dc13b87f69057c69a2fbcb12

  • SHA512

    fdf70f2461b3545a35036e048729f4d017fbe07a23bf1c798c0d361e0c40effbaeaf0cfa456595e8f8f12856646d3775caab0fa62749a91dbeba5ac15a7e7684

  • SSDEEP

    98304:I0lqCFCAFJhfERmT91WlTlUkJy7O3opFENHBKYqmceGKxvfU:I0wCFCAThfERNd3opShDqVLCvfU

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      5e1ddfda21a6173d58ce736c2b52ce5cab778546debd8c37088b0d4bfd25db87

    • Size

      4.4MB

    • MD5

      4ebf7d1e973b2dee41e6f9c4f811e9b2

    • SHA1

      52e5576ee80f0009f8cb46415a883cdc2b88d37f

    • SHA256

      5e1ddfda21a6173d58ce736c2b52ce5cab778546debd8c37088b0d4bfd25db87

    • SHA512

      5c084681635b8706e451019a7b79761726f15fdde7b6bfa55032f31c2a943d982697006ac555947b3012dcd9918d9342a52fd5f37c849717f7ea914bc8d9b60a

    • SSDEEP

      98304:q4fljTvYjEw9opn6tAgvq8odCcxgPE/6XbdD25naVknCfTQEsw:qWl/FEq8Ixgs/452aVGCfkRw

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks