General

  • Target

    d8275be5b3d114246cfa9343353c153093651490aa024e1ec47af87c3e21f743N.exe

  • Size

    163KB

  • Sample

    250224-l54yxswm15

  • MD5

    bec02c6d8a8487de8e906eaf6c58b690

  • SHA1

    db06b36e4f401a758d30024730da86f9bf5fc668

  • SHA256

    d8275be5b3d114246cfa9343353c153093651490aa024e1ec47af87c3e21f743

  • SHA512

    29f24e829f5407b5814a404fb8041dc4d04cec03d14d5109192b82d97f3c17e82085e9d0ddfbb6a01333790a4a47f4613f9d4e050e5ff100b84d83036964f71d

  • SSDEEP

    1536:PzGagNtNtiZ1BHBKNgbzwMhuShIehyIayMOvlProNVU4qNVUrk/9QbfBr+7GwKrU:Ut01BhsMgSOehOOvltOrWKDBr+yJbw

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

Targets

    • Target

      d8275be5b3d114246cfa9343353c153093651490aa024e1ec47af87c3e21f743N.exe

    • Size

      163KB

    • MD5

      bec02c6d8a8487de8e906eaf6c58b690

    • SHA1

      db06b36e4f401a758d30024730da86f9bf5fc668

    • SHA256

      d8275be5b3d114246cfa9343353c153093651490aa024e1ec47af87c3e21f743

    • SHA512

      29f24e829f5407b5814a404fb8041dc4d04cec03d14d5109192b82d97f3c17e82085e9d0ddfbb6a01333790a4a47f4613f9d4e050e5ff100b84d83036964f71d

    • SSDEEP

      1536:PzGagNtNtiZ1BHBKNgbzwMhuShIehyIayMOvlProNVU4qNVUrk/9QbfBr+7GwKrU:Ut01BhsMgSOehOOvltOrWKDBr+yJbw

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks