General

  • Target

    501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58

  • Size

    636KB

  • Sample

    220719-q7ffkadbe8

  • MD5

    5ad17f673ae8220a7d6c4311e5ccebec

  • SHA1

    7b3b40b2672682fa3159ee854571964dcf912f7d

  • SHA256

    501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58

  • SHA512

    d076a6b2a9a5a98074bda17df1cdc3056a14fa1ead49de13ce1ea778f8317b36393fda3c6656f8cc5b4ca7ea258775416ea9fe57a33049d17ba634827bd1ecf3

Malware Config

Targets

    • Target

      501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58

    • Size

      636KB

    • MD5

      5ad17f673ae8220a7d6c4311e5ccebec

    • SHA1

      7b3b40b2672682fa3159ee854571964dcf912f7d

    • SHA256

      501a12070e9b88976668fe71f22b74eb94b3acdc15e28f651ee496d27b3e3e58

    • SHA512

      d076a6b2a9a5a98074bda17df1cdc3056a14fa1ead49de13ce1ea778f8317b36393fda3c6656f8cc5b4ca7ea258775416ea9fe57a33049d17ba634827bd1ecf3

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks