General

  • Target

    JaffaCakes118_d4236b778f21bd1b61c1901054e8ada2237dc572081fce344310e7890c4e6d02

  • Size

    4.1MB

  • Sample

    241222-dagwxa1jgq

  • MD5

    57a5b67312cf9e528571b81ecbb35c71

  • SHA1

    17c90d5dfcaad60469153ec954b5483caf3026d0

  • SHA256

    d4236b778f21bd1b61c1901054e8ada2237dc572081fce344310e7890c4e6d02

  • SHA512

    a922805f65483e1d3778e4e579cfc8723fcf6a9f1627f37a5682279e35aaa5136fe7cfdc53c1896a7f36439fa215ce1b3c3f3fba66c8d10b690a9f1252f0102c

  • SSDEEP

    49152:s+YJhVpqjDlKVwyJlXygDIrSnwFX8h7+tVJYAibWNzc4T6g+7yLY2tz2j6pE54I:sbVhD/PUVJYfWNzcJg+79G2CE3

Malware Config

Targets

    • Target

      JaffaCakes118_d4236b778f21bd1b61c1901054e8ada2237dc572081fce344310e7890c4e6d02

    • Size

      4.1MB

    • MD5

      57a5b67312cf9e528571b81ecbb35c71

    • SHA1

      17c90d5dfcaad60469153ec954b5483caf3026d0

    • SHA256

      d4236b778f21bd1b61c1901054e8ada2237dc572081fce344310e7890c4e6d02

    • SHA512

      a922805f65483e1d3778e4e579cfc8723fcf6a9f1627f37a5682279e35aaa5136fe7cfdc53c1896a7f36439fa215ce1b3c3f3fba66c8d10b690a9f1252f0102c

    • SSDEEP

      49152:s+YJhVpqjDlKVwyJlXygDIrSnwFX8h7+tVJYAibWNzc4T6g+7yLY2tz2j6pE54I:sbVhD/PUVJYfWNzcJg+79G2CE3

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks