Overview
overview
10Static
static
VirusShare...ac.exe
windows7_x64
10VirusShare...ac.exe
windows10_x64
10VirusShare...ac.exe
windows10-2004_x64
10VirusShare...ac.exe
windows11_x64
VirusShare...ac.exe
macos_amd64
1VirusShare...ac.exe
linux_armhf
VirusShare...ac.exe
linux_mips
VirusShare...ac.exe
linux_mipsel
VirusShare...ac.exe
linux_amd64
General
-
Target
VirusShare_270b70bad151a515136f553e5bc880ac
-
Size
344KB
-
Sample
220407-x6pq6sbdg4
-
MD5
270b70bad151a515136f553e5bc880ac
-
SHA1
77b7def336c7647c6faadaf7136d70ff1e9ba7fc
-
SHA256
db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
-
SHA512
c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win10-20220331-en
Behavioral task
behavioral3
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral4
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
macos
Behavioral task
behavioral6
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
VirusShare_270b70bad151a515136f553e5bc880ac.exe
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.45tori.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.fkr84i.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.fkri48.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.djre89.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.onion/B439-D36B-E02F-0073-1CDC
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.vmfu48.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.45tori.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.fkr84i.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.fkri48.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.djre89.win/B439-D36B-E02F-0073-1CDC
http://cerberhhyed5frqa.onion/B439-D36B-E02F-0073-1CDC
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.45tori.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.fkr84i.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.fkri48.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.djre89.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.onion/B904-2EB3-1767-0073-1B33
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.vmfu48.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.45tori.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.fkr84i.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.fkri48.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.djre89.win/B904-2EB3-1767-0073-1B33
http://cerberhhyed5frqa.onion/B904-2EB3-1767-0073-1B33
Extracted
C:\Users\Admin\Downloads\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Downloads\# DECRYPT MY FILES #.txt
cerber
http://cerberhhyed5frqa.vmfu48.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.45tori.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.fkr84i.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.fkri48.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.djre89.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.onion/2932-EC40-7D34-0073-14B3
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://cerberhhyed5frqa.vmfu48.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.45tori.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.fkr84i.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.fkri48.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.djre89.win/2932-EC40-7D34-0073-14B3
http://cerberhhyed5frqa.onion/2932-EC40-7D34-0073-14B3
Targets
-
-
Target
VirusShare_270b70bad151a515136f553e5bc880ac
-
Size
344KB
-
MD5
270b70bad151a515136f553e5bc880ac
-
SHA1
77b7def336c7647c6faadaf7136d70ff1e9ba7fc
-
SHA256
db2f389b5566822f8cecb27b989920f16137e82b54b446868d01f73af23f5bfa
-
SHA512
c198f9498d634ec4d05cf29a1bb6ade8c59a2904510464e3b292b11bcf5382d7fe603e46b6a72b14f3f996811f68101e46c467914b21ea6eccaf423df2d1a43f
-
Contacts a large (16388) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16399) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Contacts a large (16412) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies boot configuration data using bcdedit
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-