General

  • Target

    mbrLocker.exe

  • Size

    3.8MB

  • Sample

    250101-116z2sxkax

  • MD5

    86a4599be8ad5035ed8f81a776a1a106

  • SHA1

    0a51ffaeb23178e79f0a783d7c009f9bf28f95b5

  • SHA256

    5e00e50d04130b470825d6c1bd58542d32a0a4f52c4d6e6ff01ea1cfad8fce3e

  • SHA512

    e7a1f4c0d0fb5c43bba1ce1dc54007c3ecebd865f70bed963e2400db3be898fe364bed723f7f3ff58d47309a9889f4b545e3de9fc71a4a72aaa8824f26c82afa

  • SSDEEP

    98304:luH/zVSNmGHjYKNC/qPqaMy25WJTZsRvO6Y:8HBymGDY/O4ikvO

Malware Config

Targets

    • Target

      mbrLocker.exe

    • Size

      3.8MB

    • MD5

      86a4599be8ad5035ed8f81a776a1a106

    • SHA1

      0a51ffaeb23178e79f0a783d7c009f9bf28f95b5

    • SHA256

      5e00e50d04130b470825d6c1bd58542d32a0a4f52c4d6e6ff01ea1cfad8fce3e

    • SHA512

      e7a1f4c0d0fb5c43bba1ce1dc54007c3ecebd865f70bed963e2400db3be898fe364bed723f7f3ff58d47309a9889f4b545e3de9fc71a4a72aaa8824f26c82afa

    • SSDEEP

      98304:luH/zVSNmGHjYKNC/qPqaMy25WJTZsRvO6Y:8HBymGDY/O4ikvO

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Modifies boot configuration data using bcdedit

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks