General

  • Target

    JaffaCakes118_91f0bb4b2edca2bcb34da81916602bffac3f39f38b3d301c625b491b3f1d9f83

  • Size

    4.2MB

  • Sample

    241225-vnw2esznbr

  • MD5

    e5d7ed44e5cde5cdbb1c2128e3b0d76b

  • SHA1

    446ace40275bb0bfc12459d34ff3cf22444a4196

  • SHA256

    91f0bb4b2edca2bcb34da81916602bffac3f39f38b3d301c625b491b3f1d9f83

  • SHA512

    b60b8786ef0e64424ac68902bcb0b9e0924c62d8648eb3537c72ffcde76c343cbc678af7d19e5343d6712901d30169da9fa4cb0fd178211eed052f5269ab2bc6

  • SSDEEP

    98304:7FRM2Etxy6p329XOxQdnD4A4XCkyg2Jn3PU/tjZrXV7G6hZ:hG2O9hv2dnD4A4SkX2JngZTV7G6P

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      51665c193c4c8a02e19690dea2f995157603d54cae7cafd07ca54919328dd04f

    • Size

      4.3MB

    • MD5

      bce05aee1283ddf6689af9a21b079d82

    • SHA1

      fa4c5ad37e908b0301657dd5713e193520ab6cb2

    • SHA256

      51665c193c4c8a02e19690dea2f995157603d54cae7cafd07ca54919328dd04f

    • SHA512

      18a5ae7be35668385833e830924447c1cc6cd32c6eae3625e70ca91ee0c5dba63fb054085cbcfa9d62a21c53055faa3e6dd410d02e04fe4261e7ba75f5789647

    • SSDEEP

      98304:CvlIO4SJcUBcTo9Zm+TZtFOecRtU7OHDr1ElG21/RrxI6TKIpCgjh:CftJjzY+TpO5trDJxsFxI6mlgjh

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks