General

  • Target

    77e0a8d49c34418c7601620610c1ddcb8d2d45d04dbeaa4cdd96e9c93e739331.exe

  • Size

    96KB

  • Sample

    250122-d1f3aswkfz

  • MD5

    5e4fa78429c5792e57b42266d0c17389

  • SHA1

    52fd30e45109ab2503cf9545da4d97c385b2e096

  • SHA256

    77e0a8d49c34418c7601620610c1ddcb8d2d45d04dbeaa4cdd96e9c93e739331

  • SHA512

    8f51a015ca701902c6dd21497ccd37dc7b9ffb19f34309204d4824d07f82a7e5f12bb9c39277ff4037ffd0da245974e57e8d64b939eb321dbd49770a2344cf8b

  • SSDEEP

    1536:G/qQjG+wWpEl0cYN4iP3F37HK2Lm7RZObZUUWaegPYAy:2qQjGHWSDYtfFr3mClUUWaev

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      77e0a8d49c34418c7601620610c1ddcb8d2d45d04dbeaa4cdd96e9c93e739331.exe

    • Size

      96KB

    • MD5

      5e4fa78429c5792e57b42266d0c17389

    • SHA1

      52fd30e45109ab2503cf9545da4d97c385b2e096

    • SHA256

      77e0a8d49c34418c7601620610c1ddcb8d2d45d04dbeaa4cdd96e9c93e739331

    • SHA512

      8f51a015ca701902c6dd21497ccd37dc7b9ffb19f34309204d4824d07f82a7e5f12bb9c39277ff4037ffd0da245974e57e8d64b939eb321dbd49770a2344cf8b

    • SSDEEP

      1536:G/qQjG+wWpEl0cYN4iP3F37HK2Lm7RZObZUUWaegPYAy:2qQjGHWSDYtfFr3mClUUWaev

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.