General
-
Target
47f4229f3f433d5591fa59599a2496a21030b13187c7ebf8759beec2a25c0a5d
-
Size
265KB
-
Sample
201109-35cn7nkv6s
-
MD5
478e706e3f0e7b95cc63ebe380d4377a
-
SHA1
e2aa8ef7e2ced5596d26ea5340ebc300f26fab13
-
SHA256
47f4229f3f433d5591fa59599a2496a21030b13187c7ebf8759beec2a25c0a5d
-
SHA512
8108bf74bb6de6f13eeee05cf25877bc88e720ed0b6b4eb1ff1506cccecf9f6fb820c5af2c18588098446cc77746b035d313069385dc423bc553e61e400de433
Static task
static1
Behavioral task
behavioral1
Sample
47f4229f3f433d5591fa59599a2496a21030b13187c7ebf8759beec2a25c0a5d.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
47f4229f3f433d5591fa59599a2496a21030b13187c7ebf8759beec2a25c0a5d.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion.cab/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion.nu/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion.link/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.tor2web.org/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion/377E-5E97-E499-0000-0565
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/377E-5E97-E499-0000-0565(Get
http://bqyjebfh25oellur.onion.cab/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion.nu/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion.link/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.tor2web.org/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion.to/377E-5E97-E499-0000-0565);
http://bqyjebfh25oellur.onion.to/377E-5E97-E499-0000-0565
http://bqyjebfh25oellur.onion/377E-5E97-E499-0000-0565
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion.cab/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion.nu/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion.link/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.tor2web.org/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion/B173-8CFE-013F-0000-0227
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/B173-8CFE-013F-0000-0227(Get
http://bqyjebfh25oellur.onion.cab/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion.nu/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion.link/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.tor2web.org/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion.to/B173-8CFE-013F-0000-0227);
http://bqyjebfh25oellur.onion.to/B173-8CFE-013F-0000-0227
http://bqyjebfh25oellur.onion/B173-8CFE-013F-0000-0227
Targets
-
-
Target
47f4229f3f433d5591fa59599a2496a21030b13187c7ebf8759beec2a25c0a5d
-
Size
265KB
-
MD5
478e706e3f0e7b95cc63ebe380d4377a
-
SHA1
e2aa8ef7e2ced5596d26ea5340ebc300f26fab13
-
SHA256
47f4229f3f433d5591fa59599a2496a21030b13187c7ebf8759beec2a25c0a5d
-
SHA512
8108bf74bb6de6f13eeee05cf25877bc88e720ed0b6b4eb1ff1506cccecf9f6fb820c5af2c18588098446cc77746b035d313069385dc423bc553e61e400de433
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-