General

  • Target

    53dab0fb12afefb47f342c4e76da063251be9e45555a1b7d6fb436a1e7c3b88e

  • Size

    271KB

  • Sample

    220520-qmbxmsgfar

  • MD5

    73cd29e8619a44fe142331c93d8f4dea

  • SHA1

    2fa43d3a4af4e477113367e50253b6b8d6456f64

  • SHA256

    53dab0fb12afefb47f342c4e76da063251be9e45555a1b7d6fb436a1e7c3b88e

  • SHA512

    9560023c59db7e95e9e3654c2013e09ac236730dd420d05087db6e6a6fb0308ddeea9a7b1d24ffead2a5d7fc35dcedd0797f0c0001eb164a8587aa0d1028aa17

Malware Config

Targets

    • Target

      dm_2020-08-05_11-59.exe

    • Size

      380KB

    • MD5

      cd9cf64a712aaceddaa97147846d1138

    • SHA1

      d6a2d0ea670ccbe197b6aabae4f936c78c0fe8ca

    • SHA256

      bc7fb2af77215f36ed3e06ffa0082540b39038ec8f85df98a48879d9d942862b

    • SHA512

      19455a06f9a1c0db039813284811f123a34f2b14601ec92dd85f86a470b929d7b13f72c50bb27a197db1e0d73439a3e5e38782b1d9efb7a51b759606c2961eef

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks