General

  • Target

    F3C6EC081B07206679C92B3CE2066FE2DB39E8977C650.exe

  • Size

    295KB

  • Sample

    211025-3eve8shehj

  • MD5

    33ae78ba3dd28456aeb110525cfa1b4c

  • SHA1

    cea136aaf614cdf028f23534c89609393f05b158

  • SHA256

    f3c6ec081b07206679c92b3ce2066fe2db39e8977c650bf126cfd390637ae651

  • SHA512

    dcd9da59e091d9df63e53e8dd672f0c51674a69effec7f8b41202d84fc968e153f65578db6eee266bea52f9af3d18d5dd8823dc264b6ff61d9a7020356eb7ffe

Malware Config

Targets

    • Target

      F3C6EC081B07206679C92B3CE2066FE2DB39E8977C650.exe

    • Size

      295KB

    • MD5

      33ae78ba3dd28456aeb110525cfa1b4c

    • SHA1

      cea136aaf614cdf028f23534c89609393f05b158

    • SHA256

      f3c6ec081b07206679c92b3ce2066fe2db39e8977c650bf126cfd390637ae651

    • SHA512

      dcd9da59e091d9df63e53e8dd672f0c51674a69effec7f8b41202d84fc968e153f65578db6eee266bea52f9af3d18d5dd8823dc264b6ff61d9a7020356eb7ffe

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • suricata: ET MALWARE Win32/Neurevt.A/Betabot Check-in 4

      suricata: ET MALWARE Win32/Neurevt.A/Betabot Check-in 4

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Tasks