General

  • Target

    b6b1d8178d1973f654bd4c80e4cee79300f21bfe7ab9583f25f506c211560660.exe

  • Size

    288KB

  • Sample

    250202-j5qp7avpcl

  • MD5

    d088599907297eb5e034d6d4967308b6

  • SHA1

    aee102fdf22cba0449d1747911cf3f65932b073a

  • SHA256

    b6b1d8178d1973f654bd4c80e4cee79300f21bfe7ab9583f25f506c211560660

  • SHA512

    3d474f4a784a547fb62d6d3eb38a08a0437ce26721e54f8bf2ee13372d14d23235bf171cc1b2cddf7742471f756666e10eae70e8d7e889d637006f0055f8e76f

  • SSDEEP

    6144:RlYwmWhm8EEngNGZcLl+wGXAF2PbgKLV9:nmWI8RngNNLMwGXAF5KLV9

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      b6b1d8178d1973f654bd4c80e4cee79300f21bfe7ab9583f25f506c211560660.exe

    • Size

      288KB

    • MD5

      d088599907297eb5e034d6d4967308b6

    • SHA1

      aee102fdf22cba0449d1747911cf3f65932b073a

    • SHA256

      b6b1d8178d1973f654bd4c80e4cee79300f21bfe7ab9583f25f506c211560660

    • SHA512

      3d474f4a784a547fb62d6d3eb38a08a0437ce26721e54f8bf2ee13372d14d23235bf171cc1b2cddf7742471f756666e10eae70e8d7e889d637006f0055f8e76f

    • SSDEEP

      6144:RlYwmWhm8EEngNGZcLl+wGXAF2PbgKLV9:nmWI8RngNNLMwGXAF5KLV9

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks