General
-
Target
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
-
Size
270KB
-
Sample
201111-ysy8tk2fzj
-
MD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
-
SHA1
928ed756321f9fedb5c013f0d9a64ffc234fa620
-
SHA256
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
-
SHA512
f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
Static task
static1
Behavioral task
behavioral1
Sample
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.cab/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.nu/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.link/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.tor2web.org/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion/FECA-C80C-1098-0072-8B8F
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F(Get
http://bqyjebfh25oellur.onion.cab/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.nu/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.link/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.tor2web.org/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F);
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion/FECA-C80C-1098-0072-8B8F
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion.cab/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion.nu/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion.link/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.tor2web.org/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion/15DD-EF84-72E3-0072-8ADE
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/15DD-EF84-72E3-0072-8ADE(Get
http://bqyjebfh25oellur.onion.cab/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion.nu/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion.link/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.tor2web.org/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion.to/15DD-EF84-72E3-0072-8ADE);
http://bqyjebfh25oellur.onion.to/15DD-EF84-72E3-0072-8ADE
http://bqyjebfh25oellur.onion/15DD-EF84-72E3-0072-8ADE
Targets
-
-
Target
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
-
Size
270KB
-
MD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
-
SHA1
928ed756321f9fedb5c013f0d9a64ffc234fa620
-
SHA256
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
-
SHA512
f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-