General

  • Target

    JaffaCakes118_a08c49d53fcce8766d0923c0930d3974cfedb23790ff2a9724f8088f38edf141

  • Size

    4.1MB

  • Sample

    241222-ebtgrssncp

  • MD5

    26990a4ab4113abcf95ed077744b9440

  • SHA1

    62d7cd4822bce0e59b49ffa0cc2e51af1115cb8e

  • SHA256

    a08c49d53fcce8766d0923c0930d3974cfedb23790ff2a9724f8088f38edf141

  • SHA512

    b8ac9e5e5095e60740f13f8621d75d73729405ee986195de1934ad6b96fecc6c9fa260f15eeb2ca1b4e8f3624d0ef0840f1655edd837387e8934dbbd3b817a56

  • SSDEEP

    98304:IkyRUXI8Pt8Lfn/ID+DnedtXYmZJFcrI8JU22CFHUZUSeRb57kNm:fyRkI8lSnqskJFcrvUNZUfRNkU

Malware Config

Targets

    • Target

      JaffaCakes118_a08c49d53fcce8766d0923c0930d3974cfedb23790ff2a9724f8088f38edf141

    • Size

      4.1MB

    • MD5

      26990a4ab4113abcf95ed077744b9440

    • SHA1

      62d7cd4822bce0e59b49ffa0cc2e51af1115cb8e

    • SHA256

      a08c49d53fcce8766d0923c0930d3974cfedb23790ff2a9724f8088f38edf141

    • SHA512

      b8ac9e5e5095e60740f13f8621d75d73729405ee986195de1934ad6b96fecc6c9fa260f15eeb2ca1b4e8f3624d0ef0840f1655edd837387e8934dbbd3b817a56

    • SSDEEP

      98304:IkyRUXI8Pt8Lfn/ID+DnedtXYmZJFcrI8JU22CFHUZUSeRb57kNm:fyRkI8lSnqskJFcrvUNZUfRNkU

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks