General
-
Target
654423ce63e7cbef26248710b16d41dbe08bb805dfdc5cf166fd0a5646edb49dN.exe
-
Size
395KB
-
Sample
250217-gnr6kssphz
-
MD5
fd72ca5a9a912f8d8ff9957100d65710
-
SHA1
4714a7179a673acd7600526f72307ebc0fa76a0f
-
SHA256
654423ce63e7cbef26248710b16d41dbe08bb805dfdc5cf166fd0a5646edb49d
-
SHA512
c5fed3eaff4fbe653bc1d5d913ce5c6f05e784698e68546f4131b78c2dc0936b57fb940d4c6dd29748d9f57ff7e39ecfcd26aca78bed015397134611a55061fc
-
SSDEEP
6144:hYbr0CRVs4y70u4HXs4yr0u490u4Ds4yvW8lM:erU4O0dHc4i0d90dA4X
Static task
static1
Behavioral task
behavioral1
Sample
654423ce63e7cbef26248710b16d41dbe08bb805dfdc5cf166fd0a5646edb49dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
654423ce63e7cbef26248710b16d41dbe08bb805dfdc5cf166fd0a5646edb49dN.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
berbew
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
Targets
-
-
Target
654423ce63e7cbef26248710b16d41dbe08bb805dfdc5cf166fd0a5646edb49dN.exe
-
Size
395KB
-
MD5
fd72ca5a9a912f8d8ff9957100d65710
-
SHA1
4714a7179a673acd7600526f72307ebc0fa76a0f
-
SHA256
654423ce63e7cbef26248710b16d41dbe08bb805dfdc5cf166fd0a5646edb49d
-
SHA512
c5fed3eaff4fbe653bc1d5d913ce5c6f05e784698e68546f4131b78c2dc0936b57fb940d4c6dd29748d9f57ff7e39ecfcd26aca78bed015397134611a55061fc
-
SSDEEP
6144:hYbr0CRVs4y70u4HXs4yr0u490u4Ds4yvW8lM:erU4O0dHc4i0d90dA4X
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Berbew family
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-