General
-
Target
c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4.exe
-
Size
397KB
-
Sample
241231-ea9glawkfx
-
MD5
07ffc5ab2305bbb1ed694f7ebc693bdf
-
SHA1
5ef9d77feff13ee6a373fceec50a664a7dfef5c6
-
SHA256
c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4
-
SHA512
fdff2a9f28c67b1ef1ef949fb235b672d5e8d5003947534487cba684f68fde302b3568194476f5c465e8f24953b2be69a0884645a0a1e844c75b1b530b6207d3
-
SSDEEP
6144:LpHsZ/p4rqbP7mmFM6234lKm3mo8Yvi4KsLTFM6234lKm3pT11Tgkz1581hWF:6p2rqn1FB24lwR45FB24lzx1skz15LF
Static task
static1
Behavioral task
behavioral1
Sample
c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Targets
-
-
Target
c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4.exe
-
Size
397KB
-
MD5
07ffc5ab2305bbb1ed694f7ebc693bdf
-
SHA1
5ef9d77feff13ee6a373fceec50a664a7dfef5c6
-
SHA256
c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4
-
SHA512
fdff2a9f28c67b1ef1ef949fb235b672d5e8d5003947534487cba684f68fde302b3568194476f5c465e8f24953b2be69a0884645a0a1e844c75b1b530b6207d3
-
SSDEEP
6144:LpHsZ/p4rqbP7mmFM6234lKm3mo8Yvi4KsLTFM6234lKm3pT11Tgkz1581hWF:6p2rqn1FB24lwR45FB24lzx1skz15LF
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-