General

  • Target

    JaffaCakes118_80ba5d657904cb28191f6edaa9a083ae3c3a2051d4aef2373e212e5d387a4ba0

  • Size

    4.1MB

  • Sample

    241225-de8kesvrgw

  • MD5

    eced68276087f3ca28e4871ec6fcd1e4

  • SHA1

    4faa3e536a50f3f237c72f15295cbd93ede2c210

  • SHA256

    80ba5d657904cb28191f6edaa9a083ae3c3a2051d4aef2373e212e5d387a4ba0

  • SHA512

    e5691bd54dfaabed12fe7a070d8d8bdcf891a69a47b07d41695aa8e2f5300d2ecf49c232af206acc71d2cdd563345d1516b47dbf2aef74677790a0124f6971e0

  • SSDEEP

    98304:dhjMHH29pKJ+vtO9zJooAFy6ubE+6BkW7fozDXVvT3j1UivF/MCFH5UeexbY94LX:HIyKJgtO9zJyFy6ubExOW76JvT3jNvBm

Malware Config

Targets

    • Target

      JaffaCakes118_80ba5d657904cb28191f6edaa9a083ae3c3a2051d4aef2373e212e5d387a4ba0

    • Size

      4.1MB

    • MD5

      eced68276087f3ca28e4871ec6fcd1e4

    • SHA1

      4faa3e536a50f3f237c72f15295cbd93ede2c210

    • SHA256

      80ba5d657904cb28191f6edaa9a083ae3c3a2051d4aef2373e212e5d387a4ba0

    • SHA512

      e5691bd54dfaabed12fe7a070d8d8bdcf891a69a47b07d41695aa8e2f5300d2ecf49c232af206acc71d2cdd563345d1516b47dbf2aef74677790a0124f6971e0

    • SSDEEP

      98304:dhjMHH29pKJ+vtO9zJooAFy6ubE+6BkW7fozDXVvT3j1UivF/MCFH5UeexbY94LX:HIyKJgtO9zJyFy6ubExOW76JvT3jNvBm

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks