General

  • Target

    JaffaCakes118_77947768007553da7c80beec71d4376eb0c30d65a82bb7f297884d729815b1c1

  • Size

    4.1MB

  • Sample

    241226-y1zvmaxrfv

  • MD5

    db6cf2c9c788af92a0dd22320e19c5c1

  • SHA1

    a9a88c9fbc6a2b4b2aab055298cde8af1ccd4d50

  • SHA256

    77947768007553da7c80beec71d4376eb0c30d65a82bb7f297884d729815b1c1

  • SHA512

    b59780e0cd96468edf7e99c50cb6454b1241d070c2560f3097a57472a1ebca84bd099ec55da2f5f09d074ca2aa98ff115f48ceaad3180f327e2a98873e155f41

  • SSDEEP

    49152:iE1Tqsf/W6a+Dtbbl0xyPKsrj7d+ByhD0kO0DMvSB5HnEqSu5gGmWViyokqTUXji:iEIoxPrTd+ByhjpHnEl7GmWQytFMmwys

Malware Config

Targets

    • Target

      JaffaCakes118_77947768007553da7c80beec71d4376eb0c30d65a82bb7f297884d729815b1c1

    • Size

      4.1MB

    • MD5

      db6cf2c9c788af92a0dd22320e19c5c1

    • SHA1

      a9a88c9fbc6a2b4b2aab055298cde8af1ccd4d50

    • SHA256

      77947768007553da7c80beec71d4376eb0c30d65a82bb7f297884d729815b1c1

    • SHA512

      b59780e0cd96468edf7e99c50cb6454b1241d070c2560f3097a57472a1ebca84bd099ec55da2f5f09d074ca2aa98ff115f48ceaad3180f327e2a98873e155f41

    • SSDEEP

      49152:iE1Tqsf/W6a+Dtbbl0xyPKsrj7d+ByhD0kO0DMvSB5HnEqSu5gGmWViyokqTUXji:iEIoxPrTd+ByhjpHnEl7GmWQytFMmwys

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks