General

  • Target

    35dcdcfad8597316dd956f96fd78261cc5ef4b86c9483c94e0376884c78c5911

  • Size

    197KB

  • Sample

    220626-2r72esfea5

  • MD5

    ac3d1720ef9b8517cf48e025dbc7a047

  • SHA1

    d6cdafb29fd0c03d74a142e764a40022820cde6f

  • SHA256

    35dcdcfad8597316dd956f96fd78261cc5ef4b86c9483c94e0376884c78c5911

  • SHA512

    f27780c5a6d96c0b101109fe421cbaa2a68141405f82db6de00780c090fa8997c9b4ebeb6a1ff2382c76227b7227fe05c757a3ce3dfab2e01418b21045825ddc

Malware Config

Targets

    • Target

      35dcdcfad8597316dd956f96fd78261cc5ef4b86c9483c94e0376884c78c5911

    • Size

      197KB

    • MD5

      ac3d1720ef9b8517cf48e025dbc7a047

    • SHA1

      d6cdafb29fd0c03d74a142e764a40022820cde6f

    • SHA256

      35dcdcfad8597316dd956f96fd78261cc5ef4b86c9483c94e0376884c78c5911

    • SHA512

      f27780c5a6d96c0b101109fe421cbaa2a68141405f82db6de00780c090fa8997c9b4ebeb6a1ff2382c76227b7227fe05c757a3ce3dfab2e01418b21045825ddc

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks