Overview
overview
10Static
static
VirusShare...93.exe
windows7_x64
10VirusShare...93.exe
windows10_x64
10VirusShare...93.exe
windows10-2004_x64
10VirusShare...93.exe
windows11_x64
VirusShare...93.exe
macos_amd64
1VirusShare...93.exe
linux_armhf
VirusShare...93.exe
linux_mips
VirusShare...93.exe
linux_mipsel
VirusShare...93.exe
linux_amd64
General
-
Target
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93
-
Size
392KB
-
Sample
220407-x62qqsbdg7
-
MD5
6653ef20d2a3a6ef656d9c886ebabd93
-
SHA1
bb0cc0b05bb70a3d347faa94fb36a35c771b0692
-
SHA256
48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
-
SHA512
b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win10-20220331-en
Behavioral task
behavioral3
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win10v2004-20220331-en
Behavioral task
behavioral4
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.slr849.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.ret5kr.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.zgf48j.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.xltnet.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.onion/9A14-E96E-E65C-0291-953C
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.xlfp45.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.slr849.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.ret5kr.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.zgf48j.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.xltnet.win/9A14-E96E-E65C-0291-953C
http://cerberhhyed5frqa.onion/9A14-E96E-E65C-0291-953C
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.slr849.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.ret5kr.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.zgf48j.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.xltnet.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.onion/B540-BF04-0A6B-0291-93F5
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.xlfp45.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.slr849.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.ret5kr.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.zgf48j.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.xltnet.win/B540-BF04-0A6B-0291-93F5
http://cerberhhyed5frqa.onion/B540-BF04-0A6B-0291-93F5
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.xlfp45.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.slr849.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.ret5kr.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.zgf48j.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.xltnet.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.onion/AE92-45E4-74AF-0291-9041
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.xlfp45.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.slr849.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.ret5kr.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.zgf48j.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.xltnet.win/AE92-45E4-74AF-0291-9041
http://cerberhhyed5frqa.onion/AE92-45E4-74AF-0291-9041
Targets
-
-
Target
VirusShare_6653ef20d2a3a6ef656d9c886ebabd93
-
Size
392KB
-
MD5
6653ef20d2a3a6ef656d9c886ebabd93
-
SHA1
bb0cc0b05bb70a3d347faa94fb36a35c771b0692
-
SHA256
48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d
-
SHA512
b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360
-
Contacts a large (16390) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16399) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16430) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies boot configuration data using bcdedit
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-