General

  • Target

    2b5a23296d7a55018767fa187c1e75aeeb1fb5a0660ecb1cf0b53db5a1f3458b.exe

  • Size

    96KB

  • Sample

    241125-kzrkzavnfj

  • MD5

    52e11c8484741ad0b09f0a052f6a54de

  • SHA1

    61bf78606c9b46be68da974e00d24fe75b7b2cda

  • SHA256

    2b5a23296d7a55018767fa187c1e75aeeb1fb5a0660ecb1cf0b53db5a1f3458b

  • SHA512

    aa08e79e39d0952a3210de5509e1731d340f9ddde469d7823d03f1817c0656ad65b19b58f414979caef8d0dc5024690fa49ac70edc3adc5168c006bfea600ad6

  • SSDEEP

    1536:eWri2cU46KqPem3G45797qA2L0Q7RZObZUUWaegPYAG:DjIqPRGy797iBClUUWae9

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      2b5a23296d7a55018767fa187c1e75aeeb1fb5a0660ecb1cf0b53db5a1f3458b.exe

    • Size

      96KB

    • MD5

      52e11c8484741ad0b09f0a052f6a54de

    • SHA1

      61bf78606c9b46be68da974e00d24fe75b7b2cda

    • SHA256

      2b5a23296d7a55018767fa187c1e75aeeb1fb5a0660ecb1cf0b53db5a1f3458b

    • SHA512

      aa08e79e39d0952a3210de5509e1731d340f9ddde469d7823d03f1817c0656ad65b19b58f414979caef8d0dc5024690fa49ac70edc3adc5168c006bfea600ad6

    • SSDEEP

      1536:eWri2cU46KqPem3G45797qA2L0Q7RZObZUUWaegPYAG:DjIqPRGy797iBClUUWae9

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks