General

  • Target

    JaffaCakes118_b9db6023e4bcb0be16ee36452a62ac98ce87f0d8e93689982a07e845ec3e2930

  • Size

    4.1MB

  • Sample

    241226-zqeblszlbs

  • MD5

    965d0a09ef023d6fde4baa33f4978aba

  • SHA1

    067c2bc648e5ebbc97659db8c5d82036bb677eb8

  • SHA256

    b9db6023e4bcb0be16ee36452a62ac98ce87f0d8e93689982a07e845ec3e2930

  • SHA512

    14cb61ec6823d5b8551da3374feaa4f0e7c93fe7d28e21036bd172362fdca8435fda63b9ab2385b7eec0fa01645fe74584f994eef9291554f4d21e4c42c7c058

  • SSDEEP

    98304:gdoEgU21DRb5ppqCX2jccQdMsk8eXiFimPupDG15+QM2cife7hSb:SoIyDRxFGoc4k8Eisy/o2cWedSb

Malware Config

Targets

    • Target

      JaffaCakes118_b9db6023e4bcb0be16ee36452a62ac98ce87f0d8e93689982a07e845ec3e2930

    • Size

      4.1MB

    • MD5

      965d0a09ef023d6fde4baa33f4978aba

    • SHA1

      067c2bc648e5ebbc97659db8c5d82036bb677eb8

    • SHA256

      b9db6023e4bcb0be16ee36452a62ac98ce87f0d8e93689982a07e845ec3e2930

    • SHA512

      14cb61ec6823d5b8551da3374feaa4f0e7c93fe7d28e21036bd172362fdca8435fda63b9ab2385b7eec0fa01645fe74584f994eef9291554f4d21e4c42c7c058

    • SSDEEP

      98304:gdoEgU21DRb5ppqCX2jccQdMsk8eXiFimPupDG15+QM2cife7hSb:SoIyDRxFGoc4k8Eisy/o2cWedSb

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks