General

  • Target

    Sample of order.exe

  • Size

    597KB

  • Sample

    201009-vp8e2f2zz6

  • MD5

    3c9212d20d32a311f0d3bc7e0706e5a2

  • SHA1

    b20f5b80b34b04091e1d64a16d22d727acd5955e

  • SHA256

    2962eba90f4c76463186e170ae32e1ad8ed50b589a83bee7016dc942b80cd0df

  • SHA512

    b2c8fb44661b1bcd2765c22a8474d35c78b051de6306e6dfd5257f4fe052850c4c3e117488e327b6bfeabc49dba8d609af63eb6b31aff344899ab7d83deb1453

Malware Config

Targets

    • Target

      Sample of order.exe

    • Size

      597KB

    • MD5

      3c9212d20d32a311f0d3bc7e0706e5a2

    • SHA1

      b20f5b80b34b04091e1d64a16d22d727acd5955e

    • SHA256

      2962eba90f4c76463186e170ae32e1ad8ed50b589a83bee7016dc942b80cd0df

    • SHA512

      b2c8fb44661b1bcd2765c22a8474d35c78b051de6306e6dfd5257f4fe052850c4c3e117488e327b6bfeabc49dba8d609af63eb6b31aff344899ab7d83deb1453

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks