General

  • Target

    6a3d1b066f8bc05b115c9d3c8c62b28a2c467d6e4b31c4e5484e0f4b30de92bdN.exe

  • Size

    265KB

  • Sample

    250205-d7pysaxnfs

  • MD5

    a7ab27b5630ebd4df0d3113710184e90

  • SHA1

    f07389eb213e9f5c11bd55fb40c68121ffb85294

  • SHA256

    6a3d1b066f8bc05b115c9d3c8c62b28a2c467d6e4b31c4e5484e0f4b30de92bd

  • SHA512

    14d3aafe6107174dd1595af2748d76326c7c271f57c45d09397b70d20dc718153d01c093cd50395166eb54d4336e184beca2bf44814894a6a6be7f66cfb91b0d

  • SSDEEP

    6144:DThPw3VgZvhEFM6234lKm3pT11Tgkz1581hWF:+IWFB24lzx1skz15LF

Malware Config

Extracted

Family

berbew

C2

http://viruslist.com/wcmd.txt

http://viruslist.com/ppslog.php

http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      6a3d1b066f8bc05b115c9d3c8c62b28a2c467d6e4b31c4e5484e0f4b30de92bdN.exe

    • Size

      265KB

    • MD5

      a7ab27b5630ebd4df0d3113710184e90

    • SHA1

      f07389eb213e9f5c11bd55fb40c68121ffb85294

    • SHA256

      6a3d1b066f8bc05b115c9d3c8c62b28a2c467d6e4b31c4e5484e0f4b30de92bd

    • SHA512

      14d3aafe6107174dd1595af2748d76326c7c271f57c45d09397b70d20dc718153d01c093cd50395166eb54d4336e184beca2bf44814894a6a6be7f66cfb91b0d

    • SSDEEP

      6144:DThPw3VgZvhEFM6234lKm3pT11Tgkz1581hWF:+IWFB24lzx1skz15LF

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks