General

  • Target

    c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4.exe

  • Size

    397KB

  • Sample

    241231-ea9glawkfx

  • MD5

    07ffc5ab2305bbb1ed694f7ebc693bdf

  • SHA1

    5ef9d77feff13ee6a373fceec50a664a7dfef5c6

  • SHA256

    c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4

  • SHA512

    fdff2a9f28c67b1ef1ef949fb235b672d5e8d5003947534487cba684f68fde302b3568194476f5c465e8f24953b2be69a0884645a0a1e844c75b1b530b6207d3

  • SSDEEP

    6144:LpHsZ/p4rqbP7mmFM6234lKm3mo8Yvi4KsLTFM6234lKm3pT11Tgkz1581hWF:6p2rqn1FB24lwR45FB24lzx1skz15LF

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4.exe

    • Size

      397KB

    • MD5

      07ffc5ab2305bbb1ed694f7ebc693bdf

    • SHA1

      5ef9d77feff13ee6a373fceec50a664a7dfef5c6

    • SHA256

      c3b2eb0fb37540fcf4ec1c27e219e316e8f6d505dc619a834714ab9055f03aa4

    • SHA512

      fdff2a9f28c67b1ef1ef949fb235b672d5e8d5003947534487cba684f68fde302b3568194476f5c465e8f24953b2be69a0884645a0a1e844c75b1b530b6207d3

    • SSDEEP

      6144:LpHsZ/p4rqbP7mmFM6234lKm3mo8Yvi4KsLTFM6234lKm3pT11Tgkz1581hWF:6p2rqn1FB24lwR45FB24lzx1skz15LF

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks