General

  • Target

    JaffaCakes118_fadc5cb70bbe125735afc82f6e370702e346b2eeda6ce7f082c289e1be9c460c

  • Size

    4.2MB

  • Sample

    241229-ppnhsa1qfp

  • MD5

    876f2eeb9fc34ba1adc9cac8f40e3c15

  • SHA1

    04ce2ce0dd20fc8e46af93a51725899c0723eba2

  • SHA256

    fadc5cb70bbe125735afc82f6e370702e346b2eeda6ce7f082c289e1be9c460c

  • SHA512

    34f429a1528a50b0e7d5fff71b4a3a2591d79b02a4229ece0a4c32863a3df58cb4236bcb7387f545fda938f853590aececa8a00ac46fc96631cfb6659b7a0707

  • SSDEEP

    98304:gJJpbl7XOx+jYhg5OvJM8jMuu1EnVn83R5+7AmhR9:SDlCUo9suu1EVnuo1J

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_fadc5cb70bbe125735afc82f6e370702e346b2eeda6ce7f082c289e1be9c460c

    • Size

      4.2MB

    • MD5

      876f2eeb9fc34ba1adc9cac8f40e3c15

    • SHA1

      04ce2ce0dd20fc8e46af93a51725899c0723eba2

    • SHA256

      fadc5cb70bbe125735afc82f6e370702e346b2eeda6ce7f082c289e1be9c460c

    • SHA512

      34f429a1528a50b0e7d5fff71b4a3a2591d79b02a4229ece0a4c32863a3df58cb4236bcb7387f545fda938f853590aececa8a00ac46fc96631cfb6659b7a0707

    • SSDEEP

      98304:gJJpbl7XOx+jYhg5OvJM8jMuu1EnVn83R5+7AmhR9:SDlCUo9suu1EVnuo1J

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks