General

  • Target

    JaffaCakes118_1b6ef2ee45e13ecfb1af17de590147cd85bb92ae0a2f8563a893cebd9ddcf640

  • Size

    4.3MB

  • Sample

    241223-x5c1zsylfp

  • MD5

    52ce0566bb65932121703322fbb40f49

  • SHA1

    277b27486fe8d7d5cf93dfa990cf3cc01fc3df60

  • SHA256

    1b6ef2ee45e13ecfb1af17de590147cd85bb92ae0a2f8563a893cebd9ddcf640

  • SHA512

    b4dad22bbc2788bbcf7ff02f24144b5b130ef8b30ed8ce76cf514349c3d53e2c8f4174a76545e796ab9afc153fed240795f07bbc08810f060195a4ef8d4f4a6c

  • SSDEEP

    98304:6a7zpNftkUvrbe0N/Dr09zGVCU2GXDxCcxTmKMTk/C20I4B48Lqr:Z3CUvnnDqzGpF/IlQD0b1O

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_1b6ef2ee45e13ecfb1af17de590147cd85bb92ae0a2f8563a893cebd9ddcf640

    • Size

      4.3MB

    • MD5

      52ce0566bb65932121703322fbb40f49

    • SHA1

      277b27486fe8d7d5cf93dfa990cf3cc01fc3df60

    • SHA256

      1b6ef2ee45e13ecfb1af17de590147cd85bb92ae0a2f8563a893cebd9ddcf640

    • SHA512

      b4dad22bbc2788bbcf7ff02f24144b5b130ef8b30ed8ce76cf514349c3d53e2c8f4174a76545e796ab9afc153fed240795f07bbc08810f060195a4ef8d4f4a6c

    • SSDEEP

      98304:6a7zpNftkUvrbe0N/Dr09zGVCU2GXDxCcxTmKMTk/C20I4B48Lqr:Z3CUvnnDqzGpF/IlQD0b1O

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks