General

  • Target

    5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514

  • Size

    508KB

  • Sample

    220731-23tyyaddbq

  • MD5

    5978aacb831bffcba163c62ab77563fa

  • SHA1

    97d325ea7f0d196f60269854ee090a119940908a

  • SHA256

    5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514

  • SHA512

    68d6226ff7cf443efb33b04beec9a99ddd3137bc6d4759dc36e4623619742aae712562af08b58148e30d05d2e34c8cbcb9f57d5434cdeebeb8b9158c4c6f03a3

Malware Config

Targets

    • Target

      5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514

    • Size

      508KB

    • MD5

      5978aacb831bffcba163c62ab77563fa

    • SHA1

      97d325ea7f0d196f60269854ee090a119940908a

    • SHA256

      5d8cda8367fec454320c4ada9011a0a65277505a4daad34da24bf768457ff514

    • SHA512

      68d6226ff7cf443efb33b04beec9a99ddd3137bc6d4759dc36e4623619742aae712562af08b58148e30d05d2e34c8cbcb9f57d5434cdeebeb8b9158c4c6f03a3

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks