General

  • Target

    JaffaCakes118_cf9c0f38b6b3c2328cc3685b5d7e1dfe4d3d81ae221fee63605f951dc975b316

  • Size

    4.1MB

  • Sample

    241225-et5yhsxnfz

  • MD5

    0a56938bbf81266c0431bd24c3b92319

  • SHA1

    4aa3e6a7035a734b3d49e03ce01144c3cc57b0fe

  • SHA256

    cf9c0f38b6b3c2328cc3685b5d7e1dfe4d3d81ae221fee63605f951dc975b316

  • SHA512

    8da3d210fb69ddcb3de0f7a06c517deb13ce63be0ed9cf3cfe6b6f59c893394776dab84f0604a13d10e66d84abaa2ee9fed598b024525f06c916267300571870

  • SSDEEP

    98304:jYSFd+kz+Z9VvgGaWJrARuv3+7z5ju8pg2wqQdYNNwtIpY:jYSbV+Zg+puuv3+7z5ukgjqQdIyIK

Malware Config

Targets

    • Target

      JaffaCakes118_cf9c0f38b6b3c2328cc3685b5d7e1dfe4d3d81ae221fee63605f951dc975b316

    • Size

      4.1MB

    • MD5

      0a56938bbf81266c0431bd24c3b92319

    • SHA1

      4aa3e6a7035a734b3d49e03ce01144c3cc57b0fe

    • SHA256

      cf9c0f38b6b3c2328cc3685b5d7e1dfe4d3d81ae221fee63605f951dc975b316

    • SHA512

      8da3d210fb69ddcb3de0f7a06c517deb13ce63be0ed9cf3cfe6b6f59c893394776dab84f0604a13d10e66d84abaa2ee9fed598b024525f06c916267300571870

    • SSDEEP

      98304:jYSFd+kz+Z9VvgGaWJrARuv3+7z5ju8pg2wqQdYNNwtIpY:jYSbV+Zg+puuv3+7z5ukgjqQdIyIK

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks