General

  • Target

    6e86b321e64e048ad909dabba623d5b1912aa484cf39a1bb789527848496fb24

  • Size

    96KB

  • Sample

    250317-fkkfwstqs7

  • MD5

    2a5db9a1605e9db845ea1b74486dbbc9

  • SHA1

    87a50b27ea2bd23d16e25091e236aade57ac8f43

  • SHA256

    6e86b321e64e048ad909dabba623d5b1912aa484cf39a1bb789527848496fb24

  • SHA512

    accd01773e33f071e85e0552215dc131420b5112ebcb447fc051271a7f7e15f160397a45821da6d0138829cbc5ce1cf644728d75c6ad2276bac4cb05addadc44

  • SSDEEP

    1536:RBZEcP2Y2tysrq2cZneO2gGyQShy2LI7RZObZUUWaegPYAy:RBZHPC3q24enR+IClUUWaeP

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      6e86b321e64e048ad909dabba623d5b1912aa484cf39a1bb789527848496fb24

    • Size

      96KB

    • MD5

      2a5db9a1605e9db845ea1b74486dbbc9

    • SHA1

      87a50b27ea2bd23d16e25091e236aade57ac8f43

    • SHA256

      6e86b321e64e048ad909dabba623d5b1912aa484cf39a1bb789527848496fb24

    • SHA512

      accd01773e33f071e85e0552215dc131420b5112ebcb447fc051271a7f7e15f160397a45821da6d0138829cbc5ce1cf644728d75c6ad2276bac4cb05addadc44

    • SSDEEP

      1536:RBZEcP2Y2tysrq2cZneO2gGyQShy2LI7RZObZUUWaegPYAy:RBZHPC3q24enR+IClUUWaeP

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.