General

  • Target

    af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c

  • Size

    734KB

  • Sample

    220731-fnkk3aacek

  • MD5

    7969150b6ec8e1ab8a542d50c985e489

  • SHA1

    8f8ab77541b644396b50b447384f6a213b71f353

  • SHA256

    af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c

  • SHA512

    2cfdecde59f68b5ba3f6ce4b19d129853663da850aface5bdea4572a3686f71877c3f83b566818b17e02fa211b5cd3ff674e22b161cea4427cf862708095f30a

Malware Config

Targets

    • Target

      af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c

    • Size

      734KB

    • MD5

      7969150b6ec8e1ab8a542d50c985e489

    • SHA1

      8f8ab77541b644396b50b447384f6a213b71f353

    • SHA256

      af54403904ac8e687184e57ff1fddf97a7b9ce196895a7da5262b90d47da915c

    • SHA512

      2cfdecde59f68b5ba3f6ce4b19d129853663da850aface5bdea4572a3686f71877c3f83b566818b17e02fa211b5cd3ff674e22b161cea4427cf862708095f30a

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Modifies firewall policy service

    • Executes dropped EXE

    • Sets file execution options in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

6
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Tasks