General

  • Target

    db66d2cb7c474ed13a0bda512f4b03af3c1fd43c005f4ebaae158a7c34171eba

  • Size

    128KB

  • Sample

    250306-pyjk7aythy

  • MD5

    ab367e2eb9a86f916c9c0d0c36d04ce4

  • SHA1

    d5d81607a994cf4f32ca5792afba62bc58dc156f

  • SHA256

    db66d2cb7c474ed13a0bda512f4b03af3c1fd43c005f4ebaae158a7c34171eba

  • SHA512

    f5d6be5192e743df730227da75cf852804baf1178045905b776b4636577c7f5d9982ebbe5f50d41257f6ecd0cea04ac0bd012a2a694f07842923e2446ac1272b

  • SSDEEP

    1536:K+iE6yePHbEZG4PkRQ8jiVOiFwEDelFWUWkqfffffffffffffffffffffffffffS:e/ywgUKkj8CX4Pc51bwf1nFzwSAJB8g

Malware Config

Extracted

Family

berbew

C2

http://f/wcmd.htm

http://f/ppslog.php

http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d

Targets

    • Target

      db66d2cb7c474ed13a0bda512f4b03af3c1fd43c005f4ebaae158a7c34171eba

    • Size

      128KB

    • MD5

      ab367e2eb9a86f916c9c0d0c36d04ce4

    • SHA1

      d5d81607a994cf4f32ca5792afba62bc58dc156f

    • SHA256

      db66d2cb7c474ed13a0bda512f4b03af3c1fd43c005f4ebaae158a7c34171eba

    • SHA512

      f5d6be5192e743df730227da75cf852804baf1178045905b776b4636577c7f5d9982ebbe5f50d41257f6ecd0cea04ac0bd012a2a694f07842923e2446ac1272b

    • SSDEEP

      1536:K+iE6yePHbEZG4PkRQ8jiVOiFwEDelFWUWkqfffffffffffffffffffffffffffS:e/ywgUKkj8CX4Pc51bwf1nFzwSAJB8g

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks