General

  • Target

    47a66d649255dbc9d3d1a6b8741b496b40a546bacb4a617097c12b47c4141e67

  • Size

    676KB

  • Sample

    220714-gph93aghdm

  • MD5

    136a92809145ab1a845163a57ff55dbe

  • SHA1

    ba48af37036817e8e7481797b1301af53910814e

  • SHA256

    47a66d649255dbc9d3d1a6b8741b496b40a546bacb4a617097c12b47c4141e67

  • SHA512

    015dc7396b68001000ecc6d3b477af2d5acae6a947cc4800f7dff4a7af2c13efb5c8a3db44c7b2f4dd5ffe42468595540d51a8d04677a2775d685e5e8eb96850

Malware Config

Targets

    • Target

      47a66d649255dbc9d3d1a6b8741b496b40a546bacb4a617097c12b47c4141e67

    • Size

      676KB

    • MD5

      136a92809145ab1a845163a57ff55dbe

    • SHA1

      ba48af37036817e8e7481797b1301af53910814e

    • SHA256

      47a66d649255dbc9d3d1a6b8741b496b40a546bacb4a617097c12b47c4141e67

    • SHA512

      015dc7396b68001000ecc6d3b477af2d5acae6a947cc4800f7dff4a7af2c13efb5c8a3db44c7b2f4dd5ffe42468595540d51a8d04677a2775d685e5e8eb96850

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks