General

  • Target

    JaffaCakes118_73bf5c50fb233a0522f4ebd7c19283a29cbe1500fb2653c21ddd2911dcd5b290

  • Size

    4.3MB

  • Sample

    241223-tvw5bsvlaq

  • MD5

    3912505e72e670e59a68d565d1458729

  • SHA1

    c99ce78d935cfbd7ab27ece53e5421e9e103df61

  • SHA256

    73bf5c50fb233a0522f4ebd7c19283a29cbe1500fb2653c21ddd2911dcd5b290

  • SHA512

    fb84697a8b05055c866cd290db90f9356eb7d74ed0547716443ca2add00ad48f37c5eb361268305bb7f4ee3575c726017509f2ac77570e508996a075523947db

  • SSDEEP

    98304:A/hWCkvPlOqqtrkhxQl0dmwxbL43lWU22vGRhBjTS:gkFFqKQydmobLW/2gIBi

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      e1ca2aaef66a28e269605362011ec30f8139c8f45e417c0861e3794ce56157dc

    • Size

      4.5MB

    • MD5

      37adc4b3fb23138770a1f2f13b8c1a9a

    • SHA1

      0c84259d1592f0c0be27039cbeb8065de762c070

    • SHA256

      e1ca2aaef66a28e269605362011ec30f8139c8f45e417c0861e3794ce56157dc

    • SHA512

      838c15cb25589b99c08653e9c6670454454fe4e84ad1a08a34fce6cc6b4e4e3cc61849756fe742c739e21457c57491c113c4807f6ba1fe18f244a1dfe8528c73

    • SSDEEP

      98304:tmj3hSyutynZNQwADn5SMQ8Pz/2bsxu0jIPoRwWhAUIA4YdXK:g3RutynZNQl5yQz+bsxptphAUIA42K

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks