General

  • Target

    8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710.zip

  • Size

    735KB

  • Sample

    250128-q98vws1jes

  • MD5

    2881431ec401c97769deab2162ef3b7c

  • SHA1

    529ae605e3bd81f373278ce6cd0853bb07450ac6

  • SHA256

    790fe3f399f96a9588f57b1221259869bb506a009e79d947cb7ec633698d4243

  • SHA512

    8e5ecbaaf968ab08f3002f22075a06d05eb5d458dad66cf4351e7aaa74b84b18e48f92557931e8ec2f961a68bc766e21cfb5ef452e8c7162ba76f39c8007fda5

  • SSDEEP

    12288:vfYCjYoLEEjdYgkqjBh1zMV4JUwdgQu2g2R3Q/EX8UlfmNo+6H8iqmP9ybQssY:vfTLEEjDkaGC9dg8g2R3WEXFmCH/Zl/Y

Malware Config

Targets

    • Target

      8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710.exe

    • Size

      1.2MB

    • MD5

      24c7a082a3712ad00cea6f1bfee81f9c

    • SHA1

      67f06a9982358afdf69163b3fd642c231fa0a9c4

    • SHA256

      8940ee6fe6900beb6113cbd48e2f54f81e36b3806bbb6c73ae514982cc98a710

    • SHA512

      ad9097c842e517fa034e5abecb07851cad0d1e5c0433cc1765bf95ee20869d445290fc71e2d20bf7121f780c3336eb0c2397c20c7e8ee541dbf946061442b783

    • SSDEEP

      24576:q7kybXvovms3JuIfILdzxtJzJOJTe87RMMeQjm:KMZJuIwLdNtJzJOJTJeQS

    • BetaBot

      Beta Bot is a Trojan that infects computers and disables Antivirus.

    • Betabot family

    • Modifies firewall policy service

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Looks for VMWare services registry key.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks