General
-
Target
60d73258ca23674507f4a882a2c49faa648975e9ed810d9a93d49e6de207b060
-
Size
265KB
-
Sample
201108-nmds6ydssx
-
MD5
b256c9ca1a41c2df7c8a26e1f142b89b
-
SHA1
ba3ca7e832774387b13b743b1bf7fe478412c55e
-
SHA256
60d73258ca23674507f4a882a2c49faa648975e9ed810d9a93d49e6de207b060
-
SHA512
c587185bf7b9fdc8c08c5ee066d3d997b2d15d1f24300cbcf77b050409cfa7b1630fc5d491ebd6904ba7949b76ea0b9f435107735bd3cb1bd489f10650bb9b55
Static task
static1
Behavioral task
behavioral1
Sample
60d73258ca23674507f4a882a2c49faa648975e9ed810d9a93d49e6de207b060.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
60d73258ca23674507f4a882a2c49faa648975e9ed810d9a93d49e6de207b060.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion.cab/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion.nu/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion.link/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.tor2web.org/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion/42AB-249C-D250-0000-02E0
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/42AB-249C-D250-0000-02E0(Get
http://bqyjebfh25oellur.onion.cab/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion.nu/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion.link/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.tor2web.org/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion.to/42AB-249C-D250-0000-02E0);
http://bqyjebfh25oellur.onion.to/42AB-249C-D250-0000-02E0
http://bqyjebfh25oellur.onion/42AB-249C-D250-0000-02E0
Extracted
C:\Users\Admin\Downloads\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion.cab/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion.nu/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion.link/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.tor2web.org/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion/0B35-CA2A-FBAA-0000-0E29
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/0B35-CA2A-FBAA-0000-0E29(Get
http://bqyjebfh25oellur.onion.cab/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion.nu/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion.link/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.tor2web.org/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion.to/0B35-CA2A-FBAA-0000-0E29);
http://bqyjebfh25oellur.onion.to/0B35-CA2A-FBAA-0000-0E29
http://bqyjebfh25oellur.onion/0B35-CA2A-FBAA-0000-0E29
Targets
-
-
Target
60d73258ca23674507f4a882a2c49faa648975e9ed810d9a93d49e6de207b060
-
Size
265KB
-
MD5
b256c9ca1a41c2df7c8a26e1f142b89b
-
SHA1
ba3ca7e832774387b13b743b1bf7fe478412c55e
-
SHA256
60d73258ca23674507f4a882a2c49faa648975e9ed810d9a93d49e6de207b060
-
SHA512
c587185bf7b9fdc8c08c5ee066d3d997b2d15d1f24300cbcf77b050409cfa7b1630fc5d491ebd6904ba7949b76ea0b9f435107735bd3cb1bd489f10650bb9b55
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-