General

  • Target

    17a045b9be0021cfd7c7635e052ac4c628b1428850664a688799d0a85fb2ffcd

  • Size

    96KB

  • Sample

    250328-q9ebaawzex

  • MD5

    f5cab7a9ad2ea448210bd8e5b5f90887

  • SHA1

    35c6f00c0fd1f119792e8d9f566700abaa68f749

  • SHA256

    17a045b9be0021cfd7c7635e052ac4c628b1428850664a688799d0a85fb2ffcd

  • SHA512

    b8c9e90489fd7bc6efdca557ea4f4a7a3674f042d21b1728fbbba04885d3d69128a468b48c8211c5dbd7db65408315dce9718aed9b5ec4b36acf5418c1be47e7

  • SSDEEP

    1536:ONpaLKb5g7Wph/JJZeuLV/L2L6f7RZObZUUWaegPYAy:qaLK5LrRJcuLayClUUWaeP

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Targets

    • Target

      17a045b9be0021cfd7c7635e052ac4c628b1428850664a688799d0a85fb2ffcd

    • Size

      96KB

    • MD5

      f5cab7a9ad2ea448210bd8e5b5f90887

    • SHA1

      35c6f00c0fd1f119792e8d9f566700abaa68f749

    • SHA256

      17a045b9be0021cfd7c7635e052ac4c628b1428850664a688799d0a85fb2ffcd

    • SHA512

      b8c9e90489fd7bc6efdca557ea4f4a7a3674f042d21b1728fbbba04885d3d69128a468b48c8211c5dbd7db65408315dce9718aed9b5ec4b36acf5418c1be47e7

    • SSDEEP

      1536:ONpaLKb5g7Wph/JJZeuLV/L2L6f7RZObZUUWaegPYAy:qaLK5LrRJcuLayClUUWaeP

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • Bruteratel family

    • Detect BruteRatel badger

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.