Concrete signature match: Backdoor - Provides unauthorized remote access for 32-bit Windows platform, family Berbew
Backdoor:Win32/Berbew!pz is a concrete detection of a sophisticated backdoor from the Berbew family. It establishes remote access, maintains persistence via methods like scheduled tasks, and executes commands using legitimate tools such as PowerShell, rundll32, and regsvr32. This threat is designed for extensive system control, data exfiltration, and further malicious activity.
Relevant strings associated with this threat: - io\Programas\Inicio\ (PEHSTR_EXT) - \WINME\M (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForSoftwarePacking.C!pli (PEHSTR_EXT)
f06b863f0be9c9f925627f92eceae12c73000ec254b5bcc7c56b913845b30a0f5601eb09023210296350c4c312ddab59018e974c372f3944af3175147874a762bdffb755157cfd5184418218f1ab2c5115ea50e09efeeebed9f211c2e957b490e63f6f96da59c6a894fd3614faaadd47b5ce0d8e1828c5fbd2dbc0b4a33fe01dcb3c27c07347120395212a72516e708891c2620d92a2f48bcf84b71523deb506Immediately isolate the affected system, perform a full antivirus scan to remove the threat, and investigate for any persistence mechanisms or lateral movement. Change all credentials used on the compromised machine and consider a full system re-image if deep compromise is suspected.