General

  • Target

    JaffaCakes118_ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060

  • Size

    4.1MB

  • Sample

    241229-h8nvbswnek

  • MD5

    4e0d3da3241f86736c607f9804df930c

  • SHA1

    70c61a23d38c204e94cab31ff2e18fe98353ed9b

  • SHA256

    ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060

  • SHA512

    65133cbf1a21440541ff06acf54126203f8b9cae98378f0687ab66e23f7a781c938950f02500b7bb0cf05afb80e8a5907df59091c2a9b2de4c574a8dedd350b5

  • SSDEEP

    98304:TddLOTeLcbnpUQEIRj4p+d9B87jxcjHQZyxOPg:BDcbq9IKwY6HQZ7g

Malware Config

Targets

    • Target

      JaffaCakes118_ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060

    • Size

      4.1MB

    • MD5

      4e0d3da3241f86736c607f9804df930c

    • SHA1

      70c61a23d38c204e94cab31ff2e18fe98353ed9b

    • SHA256

      ffd369555e74df453345aa1fd4b20c400d25d248d69474f1a4f7ad4c68858060

    • SHA512

      65133cbf1a21440541ff06acf54126203f8b9cae98378f0687ab66e23f7a781c938950f02500b7bb0cf05afb80e8a5907df59091c2a9b2de4c574a8dedd350b5

    • SSDEEP

      98304:TddLOTeLcbnpUQEIRj4p+d9B87jxcjHQZyxOPg:BDcbq9IKwY6HQZ7g

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks