General

  • Target

    JaffaCakes118_5c464f4442f848c63b3c902872a15c32319b976d97f5b53e54ab1339e2b0f80b

  • Size

    4.4MB

  • Sample

    241231-aahlnavngk

  • MD5

    aeb45ac9d9b176dd21d86364d78a54f4

  • SHA1

    55dccc7da7ee2cb7bc7da08322f1b5fbbdb1267e

  • SHA256

    5c464f4442f848c63b3c902872a15c32319b976d97f5b53e54ab1339e2b0f80b

  • SHA512

    71940fb913817e34d65ef2a00962e5c07b9755bb2fcacb433b26a9ed82000e083ab64a57e3924e4c7e1417ab6873e52625cd0862e1c06da16e39327a91ea8ebd

  • SSDEEP

    98304:OivX17+0qy7n5uCYn4H+Ptdsqb5uuIqvMO7G/sgQ9NaT:rlpqykY+PtCAouI0Jk

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_5c464f4442f848c63b3c902872a15c32319b976d97f5b53e54ab1339e2b0f80b

    • Size

      4.4MB

    • MD5

      aeb45ac9d9b176dd21d86364d78a54f4

    • SHA1

      55dccc7da7ee2cb7bc7da08322f1b5fbbdb1267e

    • SHA256

      5c464f4442f848c63b3c902872a15c32319b976d97f5b53e54ab1339e2b0f80b

    • SHA512

      71940fb913817e34d65ef2a00962e5c07b9755bb2fcacb433b26a9ed82000e083ab64a57e3924e4c7e1417ab6873e52625cd0862e1c06da16e39327a91ea8ebd

    • SSDEEP

      98304:OivX17+0qy7n5uCYn4H+Ptdsqb5uuIqvMO7G/sgQ9NaT:rlpqykY+PtCAouI0Jk

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.