General

  • Target

    JaffaCakes118_b0b1ae7c765a0f6acc91bf7c6c955be460253718daf8180eb2923a0d00da0434

  • Size

    4.3MB

  • Sample

    241229-q3s6vssqey

  • MD5

    6ba8468baaceda3d21ef209acde7866e

  • SHA1

    657d00a54051d77b39398b41d6a9f8e787b19168

  • SHA256

    b0b1ae7c765a0f6acc91bf7c6c955be460253718daf8180eb2923a0d00da0434

  • SHA512

    26663bb3794793bdd684ce746a9abe889abb7a19f7849706175ae26673cf6ecd5ec658c16ec13499f701bd1942877d12f9233ee81dfef828b4e76f904a14faaf

  • SSDEEP

    98304:6g48MQ34jpMVu5W8UJMbsR3/RjaOY04/AiPdhlfzFCccyyyaG:6g734KMmRjaX04/95FCLyyPG

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      146f903893804a1301d94cd7a0c391f4d49b04e0d166a53f08eb99eb79b2fed8

    • Size

      4.5MB

    • MD5

      10f74ec5669234291d6b5f2ad02ccc46

    • SHA1

      c756b0a9c8051906ed47f798e42a8ef56b676f12

    • SHA256

      146f903893804a1301d94cd7a0c391f4d49b04e0d166a53f08eb99eb79b2fed8

    • SHA512

      3989f93ed0f8b65989bf0ed3e05de86d07145a17442128fa49ad3e7263bbb0a554d10c648ec5e855ed4b7cde8c64bee7900d87dee122c47135df29994478dac2

    • SSDEEP

      49152:nABULXYvDkMcnZSYgLMBQBDHjWz0Kt8fdqEzFooD4dudQd7Do7B8uT8op6jJIsUv:ABUgoMcngYkM+JsxAI4zdQ1OOoYg

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks