General

  • Target

    JaffaCakes118_99dfef80934362aa5f8bde8007412ded6ba5f66346a3f94e8e3de1e143f3d5f3

  • Size

    4.1MB

  • Sample

    241226-zjry5ayrcw

  • MD5

    fd27f1e3c55f1739d546f4faceb39984

  • SHA1

    43ee303c6947d9de183b542ed424a1febc3b6129

  • SHA256

    99dfef80934362aa5f8bde8007412ded6ba5f66346a3f94e8e3de1e143f3d5f3

  • SHA512

    278d6ea3b2fa507485b30e2ddf813df6635d3e0bf7698cd800acc803c3c4e23402964a1e2c65494381b4f0d4206bbfaa8dfed502a80adcd0262477ee1fd5cbe9

  • SSDEEP

    98304:VLVPU1jTZmc9NFhNDVJVb67aQgEUO2PAEzpFoLqIgYAtn9W6vgXp6BtAKx2FxNbR:bMh0Q3VmOQgEYHzpFoL/gYGn9W6vgZug

Malware Config

Targets

    • Target

      JaffaCakes118_99dfef80934362aa5f8bde8007412ded6ba5f66346a3f94e8e3de1e143f3d5f3

    • Size

      4.1MB

    • MD5

      fd27f1e3c55f1739d546f4faceb39984

    • SHA1

      43ee303c6947d9de183b542ed424a1febc3b6129

    • SHA256

      99dfef80934362aa5f8bde8007412ded6ba5f66346a3f94e8e3de1e143f3d5f3

    • SHA512

      278d6ea3b2fa507485b30e2ddf813df6635d3e0bf7698cd800acc803c3c4e23402964a1e2c65494381b4f0d4206bbfaa8dfed502a80adcd0262477ee1fd5cbe9

    • SSDEEP

      98304:VLVPU1jTZmc9NFhNDVJVb67aQgEUO2PAEzpFoLqIgYAtn9W6vgXp6BtAKx2FxNbR:bMh0Q3VmOQgEYHzpFoL/gYGn9W6vgZug

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks