General

  • Target

    JaffaCakes118_04a976cfc16a21e32f87adf964d8c7eaa3575e205c19802cc9cfef44c64fae04

  • Size

    4.3MB

  • Sample

    241230-w3hm1ssphj

  • MD5

    b6c9f6181bf992f39cc5056840503faa

  • SHA1

    9c46cfb95829493b13557f87e34c83afe2510f93

  • SHA256

    04a976cfc16a21e32f87adf964d8c7eaa3575e205c19802cc9cfef44c64fae04

  • SHA512

    994a0f2b2846337df7d1f9c2d90c2289b338c6056f9c013f8c7f5bf10307e9bc38759b5a1b18166a685ea370f5eb681dacd7c3413c71192da51f23764d23c7af

  • SSDEEP

    98304:N7A4LI71lRxIJtgmX2YNsDMquZJeFnjY6iu2:NA481VKiw2YsDjuON/m

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_04a976cfc16a21e32f87adf964d8c7eaa3575e205c19802cc9cfef44c64fae04

    • Size

      4.3MB

    • MD5

      b6c9f6181bf992f39cc5056840503faa

    • SHA1

      9c46cfb95829493b13557f87e34c83afe2510f93

    • SHA256

      04a976cfc16a21e32f87adf964d8c7eaa3575e205c19802cc9cfef44c64fae04

    • SHA512

      994a0f2b2846337df7d1f9c2d90c2289b338c6056f9c013f8c7f5bf10307e9bc38759b5a1b18166a685ea370f5eb681dacd7c3413c71192da51f23764d23c7af

    • SSDEEP

      98304:N7A4LI71lRxIJtgmX2YNsDMquZJeFnjY6iu2:NA481VKiw2YsDjuON/m

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks