General

  • Target

    2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch

  • Size

    9.1MB

  • Sample

    250317-jq71xst1c1

  • MD5

    c58f25c810c785f05813475023121031

  • SHA1

    6df0a077acb531e0be99bc471150cbe0afbd0679

  • SHA256

    30d781083f98cf9197b61b69f5bca602c94a24192e763c471ba37ad490c561d2

  • SHA512

    8f07a198dd1da03c98f6890654804400f4bff688d3c09e1ddbfcf8a06e5cb382e06864458e1060bdedb37d7443d27da3a80c9c18efa32f82575901a0d84d34b6

  • SSDEEP

    98304:GHxMZDJ1TRpxYVX9u2IazANfdhZytTD5iqm:sxEvYjVzAN1hwN

Malware Config

Targets

    • Target

      2025-03-17_c58f25c810c785f05813475023121031_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch

    • Size

      9.1MB

    • MD5

      c58f25c810c785f05813475023121031

    • SHA1

      6df0a077acb531e0be99bc471150cbe0afbd0679

    • SHA256

      30d781083f98cf9197b61b69f5bca602c94a24192e763c471ba37ad490c561d2

    • SHA512

      8f07a198dd1da03c98f6890654804400f4bff688d3c09e1ddbfcf8a06e5cb382e06864458e1060bdedb37d7443d27da3a80c9c18efa32f82575901a0d84d34b6

    • SSDEEP

      98304:GHxMZDJ1TRpxYVX9u2IazANfdhZytTD5iqm:sxEvYjVzAN1hwN

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks