General

  • Target

    12.bin

  • Size

    6.6MB

  • Sample

    220624-kkwalsbbcp

  • MD5

    3126073cd8ea4fc44ccf3fa7133eff17

  • SHA1

    3ed870409e72c18589e2dfc6903503e94498b1f2

  • SHA256

    86f3b511e1488811dd8d92b4b6085eefc88a2b10d89dcfb6c298244b5f9ff3ac

  • SHA512

    4f0fa0d069967c08cc506b14c1fc612d325bdbbf9e729838e980c20af95b4b7e4e1d04a1ccea47400adc59ca4307443c953ee5bc689eefb64e9a0433bfb8edb3

Malware Config

Targets

    • Target

      12.bin

    • Size

      6.6MB

    • MD5

      3126073cd8ea4fc44ccf3fa7133eff17

    • SHA1

      3ed870409e72c18589e2dfc6903503e94498b1f2

    • SHA256

      86f3b511e1488811dd8d92b4b6085eefc88a2b10d89dcfb6c298244b5f9ff3ac

    • SHA512

      4f0fa0d069967c08cc506b14c1fc612d325bdbbf9e729838e980c20af95b4b7e4e1d04a1ccea47400adc59ca4307443c953ee5bc689eefb64e9a0433bfb8edb3

    • Beapy

      Beapy is a python worm with crypto mining capabilities.

    • suricata: ET MALWARE Lemon_Duck CnC Domain in DNS Lookup

      suricata: ET MALWARE Lemon_Duck CnC Domain in DNS Lookup

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • suricata: ET MALWARE Py/Beapy CnC Checkin

      suricata: ET MALWARE Py/Beapy CnC Checkin

    • suricata: ET MALWARE Win32/Beapy CnC Domain in DNS Lookup

      suricata: ET MALWARE Win32/Beapy CnC Domain in DNS Lookup

    • Contacts a large (2887) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Contacts a large (1272) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v6

Tasks