Overview
overview
10Static
static
VirusShare...4d.exe
windows7_x64
10VirusShare...4d.exe
windows10_x64
10VirusShare...4d.exe
windows10-2004_x64
10VirusShare...4d.exe
windows11_x64
VirusShare...4d.exe
macos_amd64
1VirusShare...4d.exe
linux_armhf
VirusShare...4d.exe
linux_mips
VirusShare...4d.exe
linux_mipsel
VirusShare...4d.exe
linux_amd64
General
-
Target
VirusShare_41d87fa0c9244a9a098742155a862e4d
-
Size
382KB
-
Sample
220407-x2qsnsgecl
-
MD5
41d87fa0c9244a9a098742155a862e4d
-
SHA1
f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
-
SHA256
60767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
-
SHA512
bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win10-20220310-en
Behavioral task
behavioral3
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_41d87fa0c9244a9a098742155a862e4d.exe
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.xkfi59.top/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.sdfiso.win/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.wins4n.win/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.we34re.top/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.onion.to/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.onion/F4D8-F18A-A947-0042-FD80
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.xkfi59.top/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.sdfiso.win/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.wins4n.win/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.we34re.top/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.onion.to/F4D8-F18A-A947-0042-FD80
http://4kqd3hmqgptupi3p.onion/F4D8-F18A-A947-0042-FD80
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.xkfi59.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.sdfiso.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.wins4n.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.we34re.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion.to/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion/F8FA-CC2F-E275-0042-F6D5
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.xkfi59.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.sdfiso.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.wins4n.win/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.we34re.top/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion.to/F8FA-CC2F-E275-0042-F6D5
http://4kqd3hmqgptupi3p.onion/F8FA-CC2F-E275-0042-F6D5
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.xkfi59.top/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.sdfiso.win/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.wins4n.win/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.we34re.top/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.onion.to/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.onion/4822-A8B7-5FD2-0042-F8CC
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.xkfi59.top/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.sdfiso.win/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.wins4n.win/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.we34re.top/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.onion.to/4822-A8B7-5FD2-0042-F8CC
http://4kqd3hmqgptupi3p.onion/4822-A8B7-5FD2-0042-F8CC
Targets
-
-
Target
VirusShare_41d87fa0c9244a9a098742155a862e4d
-
Size
382KB
-
MD5
41d87fa0c9244a9a098742155a862e4d
-
SHA1
f80f8a9584fd4ec0a3e86f0a4bedd66bf204bcdc
-
SHA256
60767e516dcf017b6a446f383a87afda3ce002292866195bdcffb5c8e9dac0c9
-
SHA512
bed43d92325b572f9a1dde0f6088569679619b50d55f120b67b3db0c5dd3c1db604702881b0f7180f1a66069a9f0e2177b7bbd70af8e88da530563163afbd359
-
suricata: ET MALWARE Ransomware/Cerber Checkin 2
suricata: ET MALWARE Ransomware/Cerber Checkin 2
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (16)
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (16)
-
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (5)
suricata: ET MALWARE Ransomware/Cerber Checkin M3 (5)
-
Contacts a large (16388) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16396) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16429) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-