General
-
Target
3d4d94fa4986aa45dd7ac602f5668ce5c6fb4f8ea19d5e3d8e63aef1d01a8ecc
-
Size
1.2MB
-
Sample
250307-c5l9faswc1
-
MD5
a741509ef65391f99174c5c72aae8ae0
-
SHA1
fb06fee1f4792e2119fb851e10975f69fb8030a6
-
SHA256
3d4d94fa4986aa45dd7ac602f5668ce5c6fb4f8ea19d5e3d8e63aef1d01a8ecc
-
SHA512
f8595e479e13b2df5aed7d7d385b8320ab2d8bb0cdb893866dae07b9bd8b0c821ef4fb7b1bb4e21d864f8bdbf874c292cc0a8570b45a8645e4bfa7d859bb8c7a
-
SSDEEP
6144:zZmJmAZ7tc5E5ZC2npb+oB+Zz2HG8t0DoEWufVuvw0HBHY8rQ+6bPD3wPSk8ymLT:tRk7tmAbaz22cWfVaw0HBHY8r8ABw
Static task
static1
Behavioral task
behavioral1
Sample
3d4d94fa4986aa45dd7ac602f5668ce5c6fb4f8ea19d5e3d8e63aef1d01a8ecc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d4d94fa4986aa45dd7ac602f5668ce5c6fb4f8ea19d5e3d8e63aef1d01a8ecc.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
berbew
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Targets
-
-
Target
3d4d94fa4986aa45dd7ac602f5668ce5c6fb4f8ea19d5e3d8e63aef1d01a8ecc
-
Size
1.2MB
-
MD5
a741509ef65391f99174c5c72aae8ae0
-
SHA1
fb06fee1f4792e2119fb851e10975f69fb8030a6
-
SHA256
3d4d94fa4986aa45dd7ac602f5668ce5c6fb4f8ea19d5e3d8e63aef1d01a8ecc
-
SHA512
f8595e479e13b2df5aed7d7d385b8320ab2d8bb0cdb893866dae07b9bd8b0c821ef4fb7b1bb4e21d864f8bdbf874c292cc0a8570b45a8645e4bfa7d859bb8c7a
-
SSDEEP
6144:zZmJmAZ7tc5E5ZC2npb+oB+Zz2HG8t0DoEWufVuvw0HBHY8rQ+6bPD3wPSk8ymLT:tRk7tmAbaz22cWfVaw0HBHY8r8ABw
Score10/10-
Adds autorun key to be loaded by Explorer.exe on startup
-
Berbew family
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-