Concrete signature match: Backdoor - Provides unauthorized remote access for 32-bit Windows platform, family Berbew
Backdoor:Win32/Berbew!pz is a concrete detection of a sophisticated backdoor from the Berbew family. It establishes remote access, maintains persistence via methods like scheduled tasks, and executes commands using legitimate tools such as PowerShell, rundll32, and regsvr32. This threat is designed for extensive system control, data exfiltration, and further malicious activity.
Relevant strings associated with this threat: - io\Programas\Inicio\ (PEHSTR_EXT) - \WINME\M (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForSoftwarePacking.C!pli (PEHSTR_EXT)
e75d2101d05a26a0514be7bf9bc26ffcf11c6b9d79911f8c85a34ffe6fc4137bf06b863f0be9c9f925627f92eceae12c73000ec254b5bcc7c56b913845b30a0f5601eb09023210296350c4c312ddab59018e974c372f3944af3175147874a762bdffb755157cfd5184418218f1ab2c5115ea50e09efeeebed9f211c2e957b490e63f6f96da59c6a894fd3614faaadd47b5ce0d8e1828c5fbd2dbc0b4a33fe01dImmediately isolate the affected system, perform a full antivirus scan to remove the threat, and investigate for any persistence mechanisms or lateral movement. Change all credentials used on the compromised machine and consider a full system re-image if deep compromise is suspected.