General
-
Target
022fd303fe748e12943c578232c28e0fd1efbcad063525e1a6bbc008d6d56d2f
-
Size
99KB
-
Sample
220205-1jw4hsfhfq
-
MD5
20abc2fc4ae0ddc631322df67c828c17
-
SHA1
30fc7b84a438df84624e79d5365d4bd959fb5f72
-
SHA256
022fd303fe748e12943c578232c28e0fd1efbcad063525e1a6bbc008d6d56d2f
-
SHA512
cf311ade900a87903cfb2ea686494fb3a002f3676ffda9f58f18cb53986eb2a3482e86ed3c6609b523a0880550cf416b918b076197027c775b88e8a29079c4a1
Static task
static1
Behavioral task
behavioral1
Sample
022fd303fe748e12943c578232c28e0fd1efbcad063525e1a6bbc008d6d56d2f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
022fd303fe748e12943c578232c28e0fd1efbcad063525e1a6bbc008d6d56d2f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
http://decrypttozxybarc.onion/6938-6B08-A4FB-0006-4649
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
http://decrypttozxybarc.onion/D0B9-7690-D2D4-0006-4D1A
Targets
-
-
Target
022fd303fe748e12943c578232c28e0fd1efbcad063525e1a6bbc008d6d56d2f
-
Size
99KB
-
MD5
20abc2fc4ae0ddc631322df67c828c17
-
SHA1
30fc7b84a438df84624e79d5365d4bd959fb5f72
-
SHA256
022fd303fe748e12943c578232c28e0fd1efbcad063525e1a6bbc008d6d56d2f
-
SHA512
cf311ade900a87903cfb2ea686494fb3a002f3676ffda9f58f18cb53986eb2a3482e86ed3c6609b523a0880550cf416b918b076197027c775b88e8a29079c4a1
-
suricata: ET MALWARE Ransomware/Cerber Checkin 2
suricata: ET MALWARE Ransomware/Cerber Checkin 2
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (14)
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (14)
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (7)
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (7)
-
Looks for VirtualBox Guest Additions in registry
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-