General

  • Target

    5617c08ef5b20dab48d3561f68ff02717a06bec3a58468fe01d2b2c40e35575c

  • Size

    704KB

  • Sample

    220725-gjvqxahcd5

  • MD5

    8f697f5ffea8dd1cf7a65765ec9b0bf7

  • SHA1

    fdfc87bb2c64c4d51ff82bac4a25bc39b7366da7

  • SHA256

    5617c08ef5b20dab48d3561f68ff02717a06bec3a58468fe01d2b2c40e35575c

  • SHA512

    a1bbda373579a2e42875c787b9a138a26ebd9b5af3bfd417e17109135808a2a41ab850e8fb8217ec66f579fe0224a3a575a506fb605ac90ce095275565fb24aa

Malware Config

Targets

    • Target

      5617c08ef5b20dab48d3561f68ff02717a06bec3a58468fe01d2b2c40e35575c

    • Size

      704KB

    • MD5

      8f697f5ffea8dd1cf7a65765ec9b0bf7

    • SHA1

      fdfc87bb2c64c4d51ff82bac4a25bc39b7366da7

    • SHA256

      5617c08ef5b20dab48d3561f68ff02717a06bec3a58468fe01d2b2c40e35575c

    • SHA512

      a1bbda373579a2e42875c787b9a138a26ebd9b5af3bfd417e17109135808a2a41ab850e8fb8217ec66f579fe0224a3a575a506fb605ac90ce095275565fb24aa

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks