General

  • Target

    f0c5e902d46381eb2527ae857c4cf0fdadf0b660bbffe5343adb5cfa83a57941N.exe

  • Size

    60KB

  • Sample

    241208-dq1nyszkdt

  • MD5

    9d429c375095b2c4e0ee31eca8d41430

  • SHA1

    1e4824952ecca1f3891aaa483346c565f7e5e570

  • SHA256

    f0c5e902d46381eb2527ae857c4cf0fdadf0b660bbffe5343adb5cfa83a57941

  • SHA512

    a5e69b85088e086c50537448896693f0b28ab6e721769b4cf895183ab3f5d4c7415b9d020f18de9d2f253c32e902b0c3deb2d8edaf2a3a186b5e811d344d2414

  • SSDEEP

    1536:DZPI42o8JbrwhJ9d9hS94x0eo11aAB86l1r:RgourwhXnhNto/lB86l1r

Malware Config

Extracted

Family

berbew

C2

http: Server closed

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

Targets

    • Target

      f0c5e902d46381eb2527ae857c4cf0fdadf0b660bbffe5343adb5cfa83a57941N.exe

    • Size

      60KB

    • MD5

      9d429c375095b2c4e0ee31eca8d41430

    • SHA1

      1e4824952ecca1f3891aaa483346c565f7e5e570

    • SHA256

      f0c5e902d46381eb2527ae857c4cf0fdadf0b660bbffe5343adb5cfa83a57941

    • SHA512

      a5e69b85088e086c50537448896693f0b28ab6e721769b4cf895183ab3f5d4c7415b9d020f18de9d2f253c32e902b0c3deb2d8edaf2a3a186b5e811d344d2414

    • SSDEEP

      1536:DZPI42o8JbrwhJ9d9hS94x0eo11aAB86l1r:RgourwhXnhNto/lB86l1r

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks