Overview
overview
10Static
static
VirusShare...5b.exe
windows7_x64
10VirusShare...5b.exe
windows10_x64
10VirusShare...5b.exe
windows10-2004_x64
10VirusShare...5b.exe
windows11_x64
VirusShare...5b.exe
macos_amd64
1VirusShare...5b.exe
linux_armhf
VirusShare...5b.exe
linux_mips
VirusShare...5b.exe
linux_mipsel
VirusShare...5b.exe
linux_amd64
General
-
Target
VirusShare_41dd108ada487cb93a6e099e074f605b
-
Size
382KB
-
Sample
220407-x552rsbdf4
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win10-20220331-en
Behavioral task
behavioral3
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_41dd108ada487cb93a6e099e074f605b.exe
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.we34re.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.5kti58.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.vmckfi.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion.to/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion/6405-1A00-EAB2-0078-18EB
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.wins4n.win/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.we34re.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.5kti58.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.vmckfi.top/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion.to/6405-1A00-EAB2-0078-18EB
http://4kqd3hmqgptupi3p.onion/6405-1A00-EAB2-0078-18EB
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.we34re.top/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.5kti58.top/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.vmckfi.top/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.onion.to/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.onion/EC44-EE44-AB5B-0078-1302
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.wins4n.win/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.we34re.top/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.5kti58.top/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.vmckfi.top/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.onion.to/EC44-EE44-AB5B-0078-1302
http://4kqd3hmqgptupi3p.onion/EC44-EE44-AB5B-0078-1302
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://4kqd3hmqgptupi3p.wins4n.win/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.we34re.top/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.5kti58.top/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.vmckfi.top/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.onion.to/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.onion/361E-2C46-C64F-0078-1CFC
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://4kqd3hmqgptupi3p.wins4n.win/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.we34re.top/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.5kti58.top/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.vmckfi.top/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.onion.to/361E-2C46-C64F-0078-1CFC
http://4kqd3hmqgptupi3p.onion/361E-2C46-C64F-0078-1CFC
Targets
-
-
Target
VirusShare_41dd108ada487cb93a6e099e074f605b
-
Size
382KB
-
MD5
41dd108ada487cb93a6e099e074f605b
-
SHA1
354f9fcee3214078d2bc5e3ea55c6b678c2fe2bf
-
SHA256
aebce4939ad8d8df9d1807debb140669e47a24c71b7978249362d3b0900c33f3
-
SHA512
33adb352e06e779871224ce094954756f15e49785fc14f8c8a02476b420b00907961d3489944c2da42fa84e8185f0f6bc7eefde58ebc4ae213fed9bfa1b5932b
-
Contacts a large (16388) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16399) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16422) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-