General

  • Target

    JaffaCakes118_2086dba5778a202843f226cc4ea5c91e9b52e632a1b3ccacf5d4111e84aad1a8

  • Size

    4.2MB

  • Sample

    241230-y8frqaxldm

  • MD5

    8aa1354554b55ec7cb9a39fbb8c3989f

  • SHA1

    509d286d077c45ddd972c7a711c86a87436bbb6a

  • SHA256

    2086dba5778a202843f226cc4ea5c91e9b52e632a1b3ccacf5d4111e84aad1a8

  • SHA512

    7c004546626c31c370abdf178d68efa022f8e58f8b77eea248b22ce08fe01bf046ad1e2acf952f56f26f7230a562146585ba30ad70b70d71c196a2ae3357d006

  • SSDEEP

    98304:U6ZT6EvZAF/Z/RGyeCv/Tq46N5UxzuO5VFyiE9bwnlhof9o9+NUi6IiC:NEEvadlRV9v/+46N5x2VM9bwnlhAGlxM

Malware Config

Targets

    • Target

      JaffaCakes118_2086dba5778a202843f226cc4ea5c91e9b52e632a1b3ccacf5d4111e84aad1a8

    • Size

      4.2MB

    • MD5

      8aa1354554b55ec7cb9a39fbb8c3989f

    • SHA1

      509d286d077c45ddd972c7a711c86a87436bbb6a

    • SHA256

      2086dba5778a202843f226cc4ea5c91e9b52e632a1b3ccacf5d4111e84aad1a8

    • SHA512

      7c004546626c31c370abdf178d68efa022f8e58f8b77eea248b22ce08fe01bf046ad1e2acf952f56f26f7230a562146585ba30ad70b70d71c196a2ae3357d006

    • SSDEEP

      98304:U6ZT6EvZAF/Z/RGyeCv/Tq46N5UxzuO5VFyiE9bwnlhof9o9+NUi6IiC:NEEvadlRV9v/+46N5x2VM9bwnlhAGlxM

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks