General

  • Target

    47bad52757620adb213d227f70fdcd6cc2e50f5316e629d817ba74bfc91c556b

  • Size

    543KB

  • Sample

    220714-gej4lsbdb7

  • MD5

    66b40402415c703185a67c670a11e317

  • SHA1

    8b28833b86a573a984503179234da27e63645fb4

  • SHA256

    47bad52757620adb213d227f70fdcd6cc2e50f5316e629d817ba74bfc91c556b

  • SHA512

    cfe0e075ae3b43b56078312a98cf8737a6efe33dcca73eee6333aba73a2eb789f560ea3adf7abb62f59357a35b84c833de0d764be81803fd22f9403cd2d02482

Malware Config

Targets

    • Target

      47bad52757620adb213d227f70fdcd6cc2e50f5316e629d817ba74bfc91c556b

    • Size

      543KB

    • MD5

      66b40402415c703185a67c670a11e317

    • SHA1

      8b28833b86a573a984503179234da27e63645fb4

    • SHA256

      47bad52757620adb213d227f70fdcd6cc2e50f5316e629d817ba74bfc91c556b

    • SHA512

      cfe0e075ae3b43b56078312a98cf8737a6efe33dcca73eee6333aba73a2eb789f560ea3adf7abb62f59357a35b84c833de0d764be81803fd22f9403cd2d02482

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks