General

  • Target

    bc46d5d26f6b28c2a535b73baf382cb96503bc608bcf0f2a65556496cc0b66a9.exe

  • Size

    96KB

  • Sample

    250109-exln2sxrf1

  • MD5

    4d6172c683dab996624189a523e37008

  • SHA1

    84b8f46283bd297433996944a29bbc79253a1cc4

  • SHA256

    bc46d5d26f6b28c2a535b73baf382cb96503bc608bcf0f2a65556496cc0b66a9

  • SHA512

    630df180c97c5186adda4d843e02947368930a5a7d64ef564d29cc62594523f3edb784ea1fc25a3d07f5603b28920e6167bcd61c8eadaf4d983bdc5b17f53e08

  • SSDEEP

    1536:w/FTqLsJZyeNrX9cG7tkNCKXwZ2LX7RZObZUUWaegPYAm:wlTJTN7917tlYwSXClUUWaet

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      bc46d5d26f6b28c2a535b73baf382cb96503bc608bcf0f2a65556496cc0b66a9.exe

    • Size

      96KB

    • MD5

      4d6172c683dab996624189a523e37008

    • SHA1

      84b8f46283bd297433996944a29bbc79253a1cc4

    • SHA256

      bc46d5d26f6b28c2a535b73baf382cb96503bc608bcf0f2a65556496cc0b66a9

    • SHA512

      630df180c97c5186adda4d843e02947368930a5a7d64ef564d29cc62594523f3edb784ea1fc25a3d07f5603b28920e6167bcd61c8eadaf4d983bdc5b17f53e08

    • SSDEEP

      1536:w/FTqLsJZyeNrX9cG7tkNCKXwZ2LX7RZObZUUWaegPYAm:wlTJTN7917tlYwSXClUUWaet

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks