General
-
Target
1cb6e2a2526f332fe132ab8905cd4cae65a1f7ef7aa4f9bf351f7f323f3b32c9
-
Size
265KB
-
Sample
201106-vthc8gs7bx
-
MD5
fabda8e31024cb3b78870ff8d6c091c4
-
SHA1
04b3bb677dcc069ec6c664fe6858514ac4bb7305
-
SHA256
1cb6e2a2526f332fe132ab8905cd4cae65a1f7ef7aa4f9bf351f7f323f3b32c9
-
SHA512
9fa93c6ce215af70969269cade65bcf2596c302f7322022befbc617b81e73f478fb96b7520847248248927db79360206c450618a2c41369f5845e96990fed223
Static task
static1
Behavioral task
behavioral1
Sample
1cb6e2a2526f332fe132ab8905cd4cae65a1f7ef7aa4f9bf351f7f323f3b32c9.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1cb6e2a2526f332fe132ab8905cd4cae65a1f7ef7aa4f9bf351f7f323f3b32c9.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion.cab/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion.nu/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion.link/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.tor2web.org/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion/B530-9DF9-D264-0000-063F
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/B530-9DF9-D264-0000-063F(Get
http://bqyjebfh25oellur.onion.cab/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion.nu/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion.link/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.tor2web.org/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion.to/B530-9DF9-D264-0000-063F);
http://bqyjebfh25oellur.onion.to/B530-9DF9-D264-0000-063F
http://bqyjebfh25oellur.onion/B530-9DF9-D264-0000-063F
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion.cab/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion.nu/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion.link/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.tor2web.org/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion/2EB2-D542-C188-0000-0B3C
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/2EB2-D542-C188-0000-0B3C(Get
http://bqyjebfh25oellur.onion.cab/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion.nu/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion.link/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.tor2web.org/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion.to/2EB2-D542-C188-0000-0B3C);
http://bqyjebfh25oellur.onion.to/2EB2-D542-C188-0000-0B3C
http://bqyjebfh25oellur.onion/2EB2-D542-C188-0000-0B3C
Targets
-
-
Target
1cb6e2a2526f332fe132ab8905cd4cae65a1f7ef7aa4f9bf351f7f323f3b32c9
-
Size
265KB
-
MD5
fabda8e31024cb3b78870ff8d6c091c4
-
SHA1
04b3bb677dcc069ec6c664fe6858514ac4bb7305
-
SHA256
1cb6e2a2526f332fe132ab8905cd4cae65a1f7ef7aa4f9bf351f7f323f3b32c9
-
SHA512
9fa93c6ce215af70969269cade65bcf2596c302f7322022befbc617b81e73f478fb96b7520847248248927db79360206c450618a2c41369f5845e96990fed223
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-