General

  • Target

    58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8

  • Size

    543KB

  • Sample

    220724-hl31qsbdc6

  • MD5

    0e7c4cb7365c823b11f7204d695b06a6

  • SHA1

    403fc69b0124c9a8d5dd0bc36011ed6be1dff64e

  • SHA256

    58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8

  • SHA512

    18b1b999e0b3c4333e837fc7f4c4b35dd908006eb9cfa6e05cdf3144fa6bbd69332b476b121e98912b7a315c8f4ac622bc341dfda7f2ffb726abdcd555ba24e9

Malware Config

Targets

    • Target

      58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8

    • Size

      543KB

    • MD5

      0e7c4cb7365c823b11f7204d695b06a6

    • SHA1

      403fc69b0124c9a8d5dd0bc36011ed6be1dff64e

    • SHA256

      58b349c793282532e1874661a64f8e5a4286c9477ecb3d08e77242359e3243b8

    • SHA512

      18b1b999e0b3c4333e837fc7f4c4b35dd908006eb9cfa6e05cdf3144fa6bbd69332b476b121e98912b7a315c8f4ac622bc341dfda7f2ffb726abdcd555ba24e9

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks