General

  • Target

    aacbf1ae2c63afd69844b051dd314f909cfcb8a4044a2cf5ac063493be335c65N.exe

  • Size

    96KB

  • Sample

    241208-cphw3sslbq

  • MD5

    52bb69a5199f7e72435ab221902429d0

  • SHA1

    7eec3abb661ca6e7bddb99673aa18d9f5193e791

  • SHA256

    aacbf1ae2c63afd69844b051dd314f909cfcb8a4044a2cf5ac063493be335c65

  • SHA512

    d263cfeb99fb035e52b6b0cb946772c7c27d2aef2c78314b92aece9bc657a6b67b05069d9b5a9c3bc288ad7afcb7b430d64963402d8fb5666a9cf5c3745ca924

  • SSDEEP

    3072:kPnBxGDAgTIIfII5IIfIIfII0II0II0II0GIIIIIIIIIIclIIfIIIIIIc7GzClUv:knELIIfII5IIfIIfII0II0II0II0GIIO

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      aacbf1ae2c63afd69844b051dd314f909cfcb8a4044a2cf5ac063493be335c65N.exe

    • Size

      96KB

    • MD5

      52bb69a5199f7e72435ab221902429d0

    • SHA1

      7eec3abb661ca6e7bddb99673aa18d9f5193e791

    • SHA256

      aacbf1ae2c63afd69844b051dd314f909cfcb8a4044a2cf5ac063493be335c65

    • SHA512

      d263cfeb99fb035e52b6b0cb946772c7c27d2aef2c78314b92aece9bc657a6b67b05069d9b5a9c3bc288ad7afcb7b430d64963402d8fb5666a9cf5c3745ca924

    • SSDEEP

      3072:kPnBxGDAgTIIfII5IIfIIfII0II0II0II0GIIIIIIIIIIclIIfIIIIIIc7GzClUv:knELIIfII5IIfIIfII0II0II0II0GIIO

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks