MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0a838fe17665b046dc6b5765a7ff56a21a562d2bc9cede2dce4530a985a0afe3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Berbew
Vendor detections: 15
| SHA256 hash: | 0a838fe17665b046dc6b5765a7ff56a21a562d2bc9cede2dce4530a985a0afe3 |
|---|---|
| SHA3-384 hash: | 5fc223002452c8673bf3bb0053aeb2e0f5ecadaeb0e1aafb7598d12797b31dbe0bec2309ab49031bd160cd14bf3ecccb |
| SHA1 hash: | 13a19016cc906483342af2bcf216122cf37b2d07 |
| MD5 hash: | e0ada85b790eda769921168d16becb60 |
| humanhash: | alanine-cold-sad-lithium |
| File name: | dontstopthebeat.exe |
| Download: | download sample |
| Signature | Berbew |
| File size: | 112'128 bytes |
| First seen: | 2024-08-22 23:12:12 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 8c06df3257a07b290c16c6c995c9688f (1 x Berbew) |
| ssdeep | 3072:uWPZ0KGNoXYNA76JnJ9jLCqwzBu1DjHLMVDqqkSpR:dSFSGAu1J9vwtu1DjrFqhz |
| TLSH | T185B39D1BA3010FF2C69FC2B5E60A99C6B32D433933778E93545990DC2393E6D52B7992 |
| TrID | 30.2% (.EXE) Win64 Executable (generic) (10523/12/4) 18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 14.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 12.9% (.EXE) Win32 Executable (generic) (4504/4/1) 5.9% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | Berbew exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
367
Origin country :
ROVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dontstopthebeat.exe
Verdict:
Malicious activity
Analysis date:
2024-08-22 23:09:55 UTC
Tags:
berbew
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Win.Packed.Barys-10002300-0
Win.Packed.Lazy-10005437-0
Win.Dropper.Berbew-10009572-0
Win.Trojan.Razy-10009897-0
Win.Malware.Padodor-10012877-0
Win.Packed.Razy-10014121-0
Win.Packed.Copak-10016523-0
Win.Malware.Generickdz-10016917-0
Win.Packed.Generickdz-10018234-0
Win.Packed.Lazy-10019975-0
Win.Packed.Generickdz-10020556-0
Win.Packed.Lazy-10023690-0
Win.Packed.Generickdz-10024067-0
Win.Packed.Lazy-10025738-0
Win.Malware.Hoax-10026410-0
Win.Packed.Copak-10028743-0
Win.Trojan.Packz-10033592-0
Win.Malware.Padodor-6840301-0
Win.Packed.Lazy-10005437-0
Win.Dropper.Berbew-10009572-0
Win.Trojan.Razy-10009897-0
Win.Malware.Padodor-10012877-0
Win.Packed.Razy-10014121-0
Win.Packed.Copak-10016523-0
Win.Malware.Generickdz-10016917-0
Win.Packed.Generickdz-10018234-0
Win.Packed.Lazy-10019975-0
Win.Packed.Generickdz-10020556-0
Win.Packed.Lazy-10023690-0
Win.Packed.Generickdz-10024067-0
Win.Packed.Lazy-10025738-0
Win.Malware.Hoax-10026410-0
Win.Packed.Copak-10028743-0
Win.Trojan.Packz-10033592-0
Win.Malware.Padodor-6840301-0
Verdict:
Malicious
Score:
99.9%
Tags:
Berbew
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Enabling autorun
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
barys lolbin packed remote xpack
Verdict:
Malicious
Labled as:
Trojan.ShellObject.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Berbew
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an undocumented autostart registry key
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Yara detected Berbew
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Padodor
Status:
Malicious
First seen:
2024-08-15 15:30:46 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
33 of 38 (86.84%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
n/a
Score:
10/10
Tags:
discovery persistence
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Drops file in System32 directory
Executes dropped EXE
Loads dropped DLL
Adds autorun key to be loaded by Explorer.exe on startup
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
80dcb47abdd78299e59128da347b51fd5f4776796f1f09c23014ab6e445ddaa3
MD5 hash:
e4ba3f7198d96694c8d5b7556d69eb1d
SHA1 hash:
bbea3ea3d8c33d5604cab265a909ccfe5f23b366
SH256 hash:
e492ef8f7d9e8d3d5ad6646c58a0404bd83a0f3f8e481f1ead1695888c75726a
MD5 hash:
9c1176427819a853186fb197cc648164
SHA1 hash:
4f8e3cd5f7cd98cabb2290eab4f7dd099c117d75
Detections:
berbew
SH256 hash:
0a838fe17665b046dc6b5765a7ff56a21a562d2bc9cede2dce4530a985a0afe3
MD5 hash:
e0ada85b790eda769921168d16becb60
SHA1 hash:
13a19016cc906483342af2bcf216122cf37b2d07
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.DLL::GetSecurityInfo ADVAPI32.DLL::SetEntriesInAclA ADVAPI32.DLL::SetSecurityInfo |
| COM_BASE_API | Can Download & Execute components | ole32.DLL::CoCreateInstance |
| MULTIMEDIA_API | Can Play Multimedia | avifil32.dll::AVIStreamGetFrameClose avifil32.dll::AVIStreamRelease |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.DLL::CreateProcessA KERNEL32.DLL::OpenProcess KERNEL32.DLL::CloseHandle KERNEL32.DLL::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::TerminateProcess KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.DLL::WinExec |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CopyFileA KERNEL32.DLL::CreateDirectoryA KERNEL32.DLL::CreateFileA KERNEL32.DLL::DeleteFileA KERNEL32.DLL::GetWindowsDirectoryA KERNEL32.DLL::GetSystemDirectoryA |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.DLL::RegCreateKeyExA ADVAPI32.DLL::RegOpenKeyExA ADVAPI32.DLL::RegQueryValueExA ADVAPI32.DLL::RegSetValueExA |
| WIN_USER_API | Performs GUI Actions | USER32.DLL::FindWindowA USER32.DLL::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.