General

  • Target

    3db3cecff27c2b1fc83f28a7da145486b21c97387c181859c7a839bf0127c77f

  • Size

    638KB

  • Sample

    220701-r8rqnaaeb8

  • MD5

    4b9a98dccb591a0504ae8ebab114d1e4

  • SHA1

    3172bbd56da5c203b7826e6ff854279f7a82f6ea

  • SHA256

    3db3cecff27c2b1fc83f28a7da145486b21c97387c181859c7a839bf0127c77f

  • SHA512

    f8271ea119bb8f7860f731b6aef1b3122d989fde78f1bfcf53e06ddd0ed51de4833d2712a99a3caf041d70fc4ee17fbcdbb31650ee5875ef8a7f652bc54df0d4

Malware Config

Targets

    • Target

      3db3cecff27c2b1fc83f28a7da145486b21c97387c181859c7a839bf0127c77f

    • Size

      638KB

    • MD5

      4b9a98dccb591a0504ae8ebab114d1e4

    • SHA1

      3172bbd56da5c203b7826e6ff854279f7a82f6ea

    • SHA256

      3db3cecff27c2b1fc83f28a7da145486b21c97387c181859c7a839bf0127c77f

    • SHA512

      f8271ea119bb8f7860f731b6aef1b3122d989fde78f1bfcf53e06ddd0ed51de4833d2712a99a3caf041d70fc4ee17fbcdbb31650ee5875ef8a7f652bc54df0d4

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks