General

  • Target

    a303cff806f0a274cacb42ba2518c021e33df79bd7dfb92e960bd5c9d457f89b.exe

  • Size

    96KB

  • Sample

    250123-z9gabavran

  • MD5

    97e0c2072b1aab0b97e4de5877652c0c

  • SHA1

    2b0ac73ef624973b831ca7e72098fccd6bd394ce

  • SHA256

    a303cff806f0a274cacb42ba2518c021e33df79bd7dfb92e960bd5c9d457f89b

  • SHA512

    9b6e8e01363ad4da494ebb5bbf985da77efae880636424dc37126197614a4c190f0c6ca2d3e4c77358670aef343e6473ecdd783da466624769b07e069151a20c

  • SSDEEP

    1536:Gk/XIgEDKG7UR8ozFQnbNNBDx2LD7RZObZUUWaegPYAS:Gk/XgDK18o6bNfDKDClUUWae/

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      a303cff806f0a274cacb42ba2518c021e33df79bd7dfb92e960bd5c9d457f89b.exe

    • Size

      96KB

    • MD5

      97e0c2072b1aab0b97e4de5877652c0c

    • SHA1

      2b0ac73ef624973b831ca7e72098fccd6bd394ce

    • SHA256

      a303cff806f0a274cacb42ba2518c021e33df79bd7dfb92e960bd5c9d457f89b

    • SHA512

      9b6e8e01363ad4da494ebb5bbf985da77efae880636424dc37126197614a4c190f0c6ca2d3e4c77358670aef343e6473ecdd783da466624769b07e069151a20c

    • SSDEEP

      1536:Gk/XIgEDKG7UR8ozFQnbNNBDx2LD7RZObZUUWaegPYAS:Gk/XgDK18o6bNfDKDClUUWae/

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.