Overview
overview
8Static
static
3beetle-cab/7za.dll
windows7-x64
1beetle-cab/7za.dll
windows10-2004-x64
3beetle-cab/7za.exe
windows7-x64
1beetle-cab/7za.exe
windows10-2004-x64
1beetle-cab/7zxa.dll
windows7-x64
3beetle-cab/7zxa.dll
windows10-2004-x64
3beetle-cab/start.cmd
windows7-x64
8beetle-cab/start.cmd
windows10-2004-x64
7General
-
Target
beetle-cab.cab
-
Size
12.5MB
-
Sample
231123-klkv9sgg37
-
MD5
6179e6dcdd9d0c1223a7dc76fc350e37
-
SHA1
856799db415ba9ef398d489e29e093f132fdc0df
-
SHA256
b5a91d9c0614412d975e2e2ce82d5aaa3453ed467bf011fdd1c8ae765d6c8c1c
-
SHA512
68932db6fd20ca6844be729217cfd94f6e715d89e74290a400c94f87a30bb08c83eb254d3d0e5b38e90bbd84870a59d37756cffda707f25342d283c251dcfaf6
-
SSDEEP
196608:dBR6ZkXHrtQbiY7YO0jJsmraB6vexQnwJSvu+lOdLpFlh6ENP5gxIlO:3R6iXH2ipjJsmr/eSWKyjlJNPiilO
Static task
static1
Behavioral task
behavioral1
Sample
beetle-cab/7za.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
beetle-cab/7za.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
beetle-cab/7za.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
beetle-cab/7za.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
beetle-cab/7zxa.dll
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
beetle-cab/7zxa.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
beetle-cab/start.cmd
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
beetle-cab/start.cmd
Resource
win10v2004-20231025-en
Malware Config
Targets
-
-
Target
beetle-cab/7za.dll
-
Size
272KB
-
MD5
b54e2dcd1a3d593ca0ae4cb71910710e
-
SHA1
15ab00317b310a7a535684c7221e0eb6cde68ac2
-
SHA256
d7f1224cc4afb90af3792dadfdf2f14bad4a19329ee0f3c87c111611aa36b7b1
-
SHA512
1414fd599095c3afd4faa6cf56e2f00d9db4d80f460457e4e08734ee24ed852f74d5813b4e96091c330ba8dd2f998995233583bbf887eff1c89b924b09a3fcc0
-
SSDEEP
6144:Ml7K/bZ3Xb4/e4BQSx65Pz6RjVM/oTO+T7KmdCUOHn:MRK/bi/ecx6gJVMgTOE7KAQ
Score3/10 -
-
-
Target
beetle-cab/7za.exe
-
Size
796KB
-
MD5
90aac6489f6b226bf7dc1adabfdb1259
-
SHA1
c90c47b717b776922cdd09758d2b4212d9ae4911
-
SHA256
ba7f3627715614d113c1e1cd7dd9d47e3402a1e8a7404043e08bc14939364549
-
SHA512
befaa9b27dc11e226b00a651aa91cbfe1ec36127084d87d44b6cd8a5076e0a092a162059295d3fcd17abb6ea9adb3b703f3652ae558c2eef4e8932131397c12d
-
SSDEEP
24576:HWdp+y7/ya3yc7tfBA6rDUzfKrBxEATB:up+fa3rLA6s+/
Score1/10 -
-
-
Target
beetle-cab/7zxa.dll
-
Size
161KB
-
MD5
72dcc77ba25ebc4984d959a78c8646d5
-
SHA1
50347fcdb44426918d2eeafd5ff8ca9385fbbb0b
-
SHA256
6b4888207c46c23d2d4e4eace8a2db01711692bc7d4bb93f3750bc41e91bb73c
-
SHA512
1ff7c0027802e65d5d668f2c7d90b71d720c964e7da03c2a8dc8e0b8456bfa8658ca57de17e66a1ebaaef5bf0be1806188813e1da608b6861bc4d8b6a48f8876
-
SSDEEP
3072:ifGI+bVn1rLT8VxY9ZcHwDLULRpqnhlGZcQU6aRg+NmVRmCHOtGgYckP:3eK7QwUqnT6aRfmVR5SYz
Score3/10 -
-
-
Target
beetle-cab/start.cmd
-
Size
86B
-
MD5
232ebf167ea35163ea69a1570be7b03e
-
SHA1
b8bc8c8b3f9ebf83ec43244a934389bd98849a0a
-
SHA256
030ee398e53caf0928e757162f3c7be7d593a59dde2795991ec7e4fd8e71f2e3
-
SHA512
efe7d716b4c2553b1dc295271b1bb32fccf12e2b64e6de7adbf5f8284bdee1c3a92b5a227c46a6bff6c1298d2e7319b73b7a75651710cad84564f0c4ec4c917f
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Installed Components in the registry
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
BITS Jobs
1Modify Registry
7Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1