General

  • Target

    51f19013cf95f58f57591eb358694cf8550acfcb018744f5f2bdabb4acffe2ae

  • Size

    504KB

  • Sample

    220717-ra3ehaaha5

  • MD5

    55c0a6b340180d04d42967f9620756e7

  • SHA1

    a6da9a2f7b6f314555050d86f8fdd76fee339fba

  • SHA256

    51f19013cf95f58f57591eb358694cf8550acfcb018744f5f2bdabb4acffe2ae

  • SHA512

    2657cb2636ca219d9478935adbe18b22d2a2e9c77d4ca8350a519a9088326b219e8cce441d59988fbb24524a19a33a818795de117e2ba3a0998d3400407ba49d

Malware Config

Targets

    • Target

      51f19013cf95f58f57591eb358694cf8550acfcb018744f5f2bdabb4acffe2ae

    • Size

      504KB

    • MD5

      55c0a6b340180d04d42967f9620756e7

    • SHA1

      a6da9a2f7b6f314555050d86f8fdd76fee339fba

    • SHA256

      51f19013cf95f58f57591eb358694cf8550acfcb018744f5f2bdabb4acffe2ae

    • SHA512

      2657cb2636ca219d9478935adbe18b22d2a2e9c77d4ca8350a519a9088326b219e8cce441d59988fbb24524a19a33a818795de117e2ba3a0998d3400407ba49d

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks