General
-
Target
28b28111884badedf0870be7bef1e417b3ddea12eb06b1c431e992be39d6bf8e
-
Size
270KB
-
Sample
201115-c92ghkg9za
-
MD5
1e97fda428488834e73a9d21f45905ca
-
SHA1
349780006801787b966a14ff7b9b7d5d0872feb6
-
SHA256
28b28111884badedf0870be7bef1e417b3ddea12eb06b1c431e992be39d6bf8e
-
SHA512
5e6848598bb9e51df29237e3154a1f271b4b6ccb474f34c0bfbc0682a53d2e41c84214a1405d63e85dcaee95e83049a465d58ede46a6d1a1324eaf3a13a19fb9
Static task
static1
Behavioral task
behavioral1
Sample
28b28111884badedf0870be7bef1e417b3ddea12eb06b1c431e992be39d6bf8e.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
28b28111884badedf0870be7bef1e417b3ddea12eb06b1c431e992be39d6bf8e.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion.cab/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion.nu/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion.link/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.tor2web.org/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion/1128-E828-FA7D-0072-88D5
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/1128-E828-FA7D-0072-88D5(Get
http://bqyjebfh25oellur.onion.cab/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion.nu/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion.link/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.tor2web.org/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion.to/1128-E828-FA7D-0072-88D5);
http://bqyjebfh25oellur.onion.to/1128-E828-FA7D-0072-88D5
http://bqyjebfh25oellur.onion/1128-E828-FA7D-0072-88D5
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion.cab/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion.nu/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion.link/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.tor2web.org/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion/B9D1-50B9-594D-0072-8EA2
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/B9D1-50B9-594D-0072-8EA2(Get
http://bqyjebfh25oellur.onion.cab/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion.nu/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion.link/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.tor2web.org/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion.to/B9D1-50B9-594D-0072-8EA2);
http://bqyjebfh25oellur.onion.to/B9D1-50B9-594D-0072-8EA2
http://bqyjebfh25oellur.onion/B9D1-50B9-594D-0072-8EA2
Targets
-
-
Target
28b28111884badedf0870be7bef1e417b3ddea12eb06b1c431e992be39d6bf8e
-
Size
270KB
-
MD5
1e97fda428488834e73a9d21f45905ca
-
SHA1
349780006801787b966a14ff7b9b7d5d0872feb6
-
SHA256
28b28111884badedf0870be7bef1e417b3ddea12eb06b1c431e992be39d6bf8e
-
SHA512
5e6848598bb9e51df29237e3154a1f271b4b6ccb474f34c0bfbc0682a53d2e41c84214a1405d63e85dcaee95e83049a465d58ede46a6d1a1324eaf3a13a19fb9
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-