General

  • Target

    5158d0f01553c8e3f7351d8b02560cb081be5cf08fbcc71bbea5885ff96e6624

  • Size

    640KB

  • Sample

    220718-tj5x4ahbe2

  • MD5

    22de52b1c44b7ff0cff825eb04d2a056

  • SHA1

    37e0fbd2bf14ac22414407a1045658a90f4e8e2f

  • SHA256

    5158d0f01553c8e3f7351d8b02560cb081be5cf08fbcc71bbea5885ff96e6624

  • SHA512

    9f257a3478ada556a3145ac4be1c1a0fe1b8d0cf00b7d39ad39c53ddbec93df873a0c952b5829a93be636288d7973366253cfc9a7b361f751682fc162eb144c0

Malware Config

Targets

    • Target

      5158d0f01553c8e3f7351d8b02560cb081be5cf08fbcc71bbea5885ff96e6624

    • Size

      640KB

    • MD5

      22de52b1c44b7ff0cff825eb04d2a056

    • SHA1

      37e0fbd2bf14ac22414407a1045658a90f4e8e2f

    • SHA256

      5158d0f01553c8e3f7351d8b02560cb081be5cf08fbcc71bbea5885ff96e6624

    • SHA512

      9f257a3478ada556a3145ac4be1c1a0fe1b8d0cf00b7d39ad39c53ddbec93df873a0c952b5829a93be636288d7973366253cfc9a7b361f751682fc162eb144c0

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks