General

  • Target

    36bc82f000d8990c074ec4e995cb9c54301f0bafbdf296e1e8dc2b86a379dec8

  • Size

    617KB

  • Sample

    220701-rkxxrsffgp

  • MD5

    e29fc6b883ed558968212332ecb19a92

  • SHA1

    56a1356b1c5d7f23f6d4f036eac8ef379226e79e

  • SHA256

    36bc82f000d8990c074ec4e995cb9c54301f0bafbdf296e1e8dc2b86a379dec8

  • SHA512

    13b2ca5db324410cbc05288f26ffe780d440290a5ed58ceaf7bf6f54f005a8bde27dc5ea5d22cb54f6664ee77bd12c8e2378e780e342e8c4fba95a7ee5d153a3

Malware Config

Targets

    • Target

      36bc82f000d8990c074ec4e995cb9c54301f0bafbdf296e1e8dc2b86a379dec8

    • Size

      617KB

    • MD5

      e29fc6b883ed558968212332ecb19a92

    • SHA1

      56a1356b1c5d7f23f6d4f036eac8ef379226e79e

    • SHA256

      36bc82f000d8990c074ec4e995cb9c54301f0bafbdf296e1e8dc2b86a379dec8

    • SHA512

      13b2ca5db324410cbc05288f26ffe780d440290a5ed58ceaf7bf6f54f005a8bde27dc5ea5d22cb54f6664ee77bd12c8e2378e780e342e8c4fba95a7ee5d153a3

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Tasks