General

  • Target

    575ff4e7d08e25de1d189c7f26971ae2c63e9f9cf28904d0894573a6cf800afb

  • Size

    96KB

  • Sample

    241210-2dr32sxmbk

  • MD5

    aeb7cfab0ba913b70368dbd0f19b7475

  • SHA1

    c011fa4d0cacbc96aea6392ae875e0ce9c623cae

  • SHA256

    575ff4e7d08e25de1d189c7f26971ae2c63e9f9cf28904d0894573a6cf800afb

  • SHA512

    5751b6b9fd500e1d7dbd348e65f4924ba48dbedd737de5487edd61d2119e52b20bb4cd9eec7665959d71477fe9fdaf2d245d6f222fdb44a99c4fcb502cb636f4

  • SSDEEP

    1536:jsrfk/JNAKYy4b+bs0/OiYEAjA+GUpoIR1JYUJZc92LLG7RZObZUUWaegPYA:jlJNbYyBLAjA+GUpFxCClUUWae

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      575ff4e7d08e25de1d189c7f26971ae2c63e9f9cf28904d0894573a6cf800afb

    • Size

      96KB

    • MD5

      aeb7cfab0ba913b70368dbd0f19b7475

    • SHA1

      c011fa4d0cacbc96aea6392ae875e0ce9c623cae

    • SHA256

      575ff4e7d08e25de1d189c7f26971ae2c63e9f9cf28904d0894573a6cf800afb

    • SHA512

      5751b6b9fd500e1d7dbd348e65f4924ba48dbedd737de5487edd61d2119e52b20bb4cd9eec7665959d71477fe9fdaf2d245d6f222fdb44a99c4fcb502cb636f4

    • SSDEEP

      1536:jsrfk/JNAKYy4b+bs0/OiYEAjA+GUpoIR1JYUJZc92LLG7RZObZUUWaegPYA:jlJNbYyBLAjA+GUpFxCClUUWae

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks