General

  • Target

    e457c71d1315ed8ff4d22f73ae26c1a2f958ba99cd0a049319e22ef46cf79c71.exe

  • Size

    288KB

  • Sample

    250119-p25ylaynan

  • MD5

    b294cbdc286ae4a3ebbb15490c365d59

  • SHA1

    fd4af730c7e2a1a3a0a16afae8fc213de73b7c82

  • SHA256

    e457c71d1315ed8ff4d22f73ae26c1a2f958ba99cd0a049319e22ef46cf79c71

  • SHA512

    d53fec1ac55dd81bcda9f1edf1f8b85a26a3c4d6e568fbf0a5e7f3625c60cfc6cb07ec0caacb87a0b5339aa85e9c01f01ad9e1ceb06b482e9d8e09faab2585a7

  • SSDEEP

    6144:peuc45tPy9T9gopujNLl+wGXAF2PbgKLVP:btPy9yokRLMwGXAF5KLVP

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      e457c71d1315ed8ff4d22f73ae26c1a2f958ba99cd0a049319e22ef46cf79c71.exe

    • Size

      288KB

    • MD5

      b294cbdc286ae4a3ebbb15490c365d59

    • SHA1

      fd4af730c7e2a1a3a0a16afae8fc213de73b7c82

    • SHA256

      e457c71d1315ed8ff4d22f73ae26c1a2f958ba99cd0a049319e22ef46cf79c71

    • SHA512

      d53fec1ac55dd81bcda9f1edf1f8b85a26a3c4d6e568fbf0a5e7f3625c60cfc6cb07ec0caacb87a0b5339aa85e9c01f01ad9e1ceb06b482e9d8e09faab2585a7

    • SSDEEP

      6144:peuc45tPy9T9gopujNLl+wGXAF2PbgKLVP:btPy9yokRLMwGXAF5KLVP

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks