General

  • Target

    241207-3k6epavqck_pw_infected.zip

  • Size

    39KB

  • Sample

    241207-3m5aeavrcp

  • MD5

    7c644f43c00b14d77e1f1d1bb175cb4b

  • SHA1

    5d5542942c1b379103eb90173f47c98d9afca62f

  • SHA256

    f7b44fe2a864e5ed6c6afc321d563a9eacfdeeec65b9489a84def5c98f813a7e

  • SHA512

    23dcbad075adb33015b2a2166fc26deccb0a83c788a7370af1c40f6e220985d5a0f565ce95cd8812198a07101bf3f6b602f5bb1e0a9551179969a719dbf65a1f

  • SSDEEP

    768:p66/C3WYizYHJ7G0Edbh5nDnKdbEk9d4pnQkUIEOtYdNFI+t:pj/KH79EdbTnDKdbROn7Uzv

Malware Config

Extracted

Family

berbew

C2

http://tat-neftbank.ru/kkq.php

http://tat-neftbank.ru/wcmd.htm

Targets

    • Target

      6c877082236f4df3b1174a6e3977f0e3f7c345fa517d5daf55018f6cc11049c7

    • Size

      113KB

    • MD5

      89e01431fac78909ed079f6b0f10dea2

    • SHA1

      c8a678d0da4ab01e89e7c7c2d7c6b16b4bfce962

    • SHA256

      6c877082236f4df3b1174a6e3977f0e3f7c345fa517d5daf55018f6cc11049c7

    • SHA512

      4f526074908d15132d3f43a4fe3b3951e6b8bc8254b08385bb57ed1a8acf339f280a84f0e5e0c4dc2efa2eaf5389fe2c168b2ef41bb5e778ec0efb2ef1a9b0d9

    • SSDEEP

      1536:mGfAZsUQYxjAWkXAN/3/aOAO617DWkZFfScD7SzCbHWrAW8wTWiliX:1ASYxda7OAOuGkZFfFSebHWrH8wTW0

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks