General
-
Target
d7b249e0053fef3323ae11a1f653c5077b53ba1a9f2f31ef8f4a1aa8f28d8773N.exe
-
Size
288KB
-
Sample
250107-rwsgesxjcr
-
MD5
aa41cdb17d5c4b27484265c06b570b70
-
SHA1
678f058f8f48efa04e54ecefbbc8b626e39f19f6
-
SHA256
d7b249e0053fef3323ae11a1f653c5077b53ba1a9f2f31ef8f4a1aa8f28d8773
-
SHA512
da7ac79ca200cde95a0f8b8cfd4454eb0959d4d87d59b6516c1874350e49bbe7275a75369a8b305aa091b1242c9282fa058cf0af4e640bbe29fdc8b190a4af53
-
SSDEEP
6144:Tk0cFSrMfWARKHDkRSLl+wGXAF2PbgKLV9:T2SrmWAEH4MLMwGXAF5KLV9
Behavioral task
behavioral1
Sample
d7b249e0053fef3323ae11a1f653c5077b53ba1a9f2f31ef8f4a1aa8f28d8773N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d7b249e0053fef3323ae11a1f653c5077b53ba1a9f2f31ef8f4a1aa8f28d8773N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
berbew
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Targets
-
-
Target
d7b249e0053fef3323ae11a1f653c5077b53ba1a9f2f31ef8f4a1aa8f28d8773N.exe
-
Size
288KB
-
MD5
aa41cdb17d5c4b27484265c06b570b70
-
SHA1
678f058f8f48efa04e54ecefbbc8b626e39f19f6
-
SHA256
d7b249e0053fef3323ae11a1f653c5077b53ba1a9f2f31ef8f4a1aa8f28d8773
-
SHA512
da7ac79ca200cde95a0f8b8cfd4454eb0959d4d87d59b6516c1874350e49bbe7275a75369a8b305aa091b1242c9282fa058cf0af4e640bbe29fdc8b190a4af53
-
SSDEEP
6144:Tk0cFSrMfWARKHDkRSLl+wGXAF2PbgKLV9:T2SrmWAEH4MLMwGXAF5KLV9
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-