General

  • Target

    JaffaCakes118_d1dd98b67a6a82b0ac5715758e7a8eb79fc85a1069caccfc23133b31bd40bd62

  • Size

    4.1MB

  • Sample

    241223-zh2rya1jbw

  • MD5

    d7663421d2fc1de2448d26f520814a59

  • SHA1

    0e7d7b3524ebf17281baf2c822a6afc240c45520

  • SHA256

    d1dd98b67a6a82b0ac5715758e7a8eb79fc85a1069caccfc23133b31bd40bd62

  • SHA512

    6c3b833dcdb80cb12ff52166733b6383d5b0516b31a01bbdf7dc7c6aca7fea128a2e29e986530d9f81a211c2915729bf41ef0380a4ba8fac10a79e30d1f644b7

  • SSDEEP

    98304:oKkfRIyYzni8DL3GJRd7yC/Q0PQW0gg+QsJB9a0nM1cpBr9rc:hBy56G/d7JQ0Pu13sFaRcpBq

Malware Config

Targets

    • Target

      JaffaCakes118_d1dd98b67a6a82b0ac5715758e7a8eb79fc85a1069caccfc23133b31bd40bd62

    • Size

      4.1MB

    • MD5

      d7663421d2fc1de2448d26f520814a59

    • SHA1

      0e7d7b3524ebf17281baf2c822a6afc240c45520

    • SHA256

      d1dd98b67a6a82b0ac5715758e7a8eb79fc85a1069caccfc23133b31bd40bd62

    • SHA512

      6c3b833dcdb80cb12ff52166733b6383d5b0516b31a01bbdf7dc7c6aca7fea128a2e29e986530d9f81a211c2915729bf41ef0380a4ba8fac10a79e30d1f644b7

    • SSDEEP

      98304:oKkfRIyYzni8DL3GJRd7yC/Q0PQW0gg+QsJB9a0nM1cpBr9rc:hBy56G/d7JQ0Pu13sFaRcpBq

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks