General

  • Target

    42db3c5de8e342fb744b2ede8e65240f65662c66fcaf76a20ddba644f3cc352c.exe

  • Size

    96KB

  • Sample

    241203-d6r2ratpfk

  • MD5

    136bccde5b53c5d730b37dae68e57984

  • SHA1

    7895792e91e7158fdb2f84c052c41fc752e06236

  • SHA256

    42db3c5de8e342fb744b2ede8e65240f65662c66fcaf76a20ddba644f3cc352c

  • SHA512

    2809dedd08dace9c1138ce20002387867eeef84416de86daa0207cc4e8e6586cbfd4a688d6e2cec14375f639d6609877a16bf89b6d1f78f7105baa1089ecbd00

  • SSDEEP

    1536:FdvO68Mn1uncuk9qR2WePWX2apUx+R2LZ7RZObZUUWaegPYAC:FdvO68tcLqRQPWX/UxXZClUUWaeH

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      42db3c5de8e342fb744b2ede8e65240f65662c66fcaf76a20ddba644f3cc352c.exe

    • Size

      96KB

    • MD5

      136bccde5b53c5d730b37dae68e57984

    • SHA1

      7895792e91e7158fdb2f84c052c41fc752e06236

    • SHA256

      42db3c5de8e342fb744b2ede8e65240f65662c66fcaf76a20ddba644f3cc352c

    • SHA512

      2809dedd08dace9c1138ce20002387867eeef84416de86daa0207cc4e8e6586cbfd4a688d6e2cec14375f639d6609877a16bf89b6d1f78f7105baa1089ecbd00

    • SSDEEP

      1536:FdvO68Mn1uncuk9qR2WePWX2apUx+R2LZ7RZObZUUWaegPYAC:FdvO68tcLqRQPWX/UxXZClUUWaeH

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks