General

  • Target

    e209f7484cb5be2e8eeee6fd9d8d8bc6a076f2320b93172661560c1fdfd15ca4N.exe

  • Size

    288KB

  • Sample

    250126-3bhl9szmfj

  • MD5

    dd46ae66d304cafb0e2c9d2bea1be1c0

  • SHA1

    e6cee8d9649890a8d036f4904d07de4af4f67c79

  • SHA256

    e209f7484cb5be2e8eeee6fd9d8d8bc6a076f2320b93172661560c1fdfd15ca4

  • SHA512

    5650de11d61d300653b262942d7b6a13aa5370c1038d5de1ebbc58d1d50f74bf4bed6a6422f3465c5042e4544933d6ba8f2952f34f27ac43e58df41c94248a89

  • SSDEEP

    3072:idu7DCyZe/AB/Cn4ihUfX3ep7LDT1Yx07KlFYzqpCZSLMi5lQvuIbuzj1DukJFvL:gu7DNUIBZihUfe1Ll+wGXAF2PbgKLVN

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      e209f7484cb5be2e8eeee6fd9d8d8bc6a076f2320b93172661560c1fdfd15ca4N.exe

    • Size

      288KB

    • MD5

      dd46ae66d304cafb0e2c9d2bea1be1c0

    • SHA1

      e6cee8d9649890a8d036f4904d07de4af4f67c79

    • SHA256

      e209f7484cb5be2e8eeee6fd9d8d8bc6a076f2320b93172661560c1fdfd15ca4

    • SHA512

      5650de11d61d300653b262942d7b6a13aa5370c1038d5de1ebbc58d1d50f74bf4bed6a6422f3465c5042e4544933d6ba8f2952f34f27ac43e58df41c94248a89

    • SSDEEP

      3072:idu7DCyZe/AB/Cn4ihUfX3ep7LDT1Yx07KlFYzqpCZSLMi5lQvuIbuzj1DukJFvL:gu7DNUIBZihUfe1Ll+wGXAF2PbgKLVN

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks