General

  • Target

    dfc3e56cc6384a5f49069a49d658a987

  • Size

    4.0MB

  • Sample

    220412-k3a3dshfer

  • MD5

    dfc3e56cc6384a5f49069a49d658a987

  • SHA1

    75294fc109314949b1b5d00669d4b73a323e290c

  • SHA256

    7656ed477671645be99bd254dc2547709e6545b2fc40124cd2bc4fac38d18447

  • SHA512

    97b65880ca0788a5b86357802a3042e1619957ebd386afb2b8e115a951560b4cf9477b980cbad31a907f09b1c6646a408c8cc45b748e9f4f77d8acb401780824

Malware Config

Targets

    • Target

      dfc3e56cc6384a5f49069a49d658a987

    • Size

      4.0MB

    • MD5

      dfc3e56cc6384a5f49069a49d658a987

    • SHA1

      75294fc109314949b1b5d00669d4b73a323e290c

    • SHA256

      7656ed477671645be99bd254dc2547709e6545b2fc40124cd2bc4fac38d18447

    • SHA512

      97b65880ca0788a5b86357802a3042e1619957ebd386afb2b8e115a951560b4cf9477b980cbad31a907f09b1c6646a408c8cc45b748e9f4f77d8acb401780824

    • LoaderBot

      LoaderBot is a loader written in .NET downloading and executing miners.

    • suricata: ET MALWARE CerberTear Ransomware CnC Checkin

      suricata: ET MALWARE CerberTear Ransomware CnC Checkin

    • LoaderBot executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks