General

  • Target

    01dace0158978bb8672459d3012ded3b5dbb3d9504f16507381598e783ee0c34

  • Size

    263KB

  • Sample

    220523-v84l1acdhm

  • MD5

    81deb3b71b3f44659347350f6d39dd05

  • SHA1

    c4c1a407b6d2596bf55f352e2d013fe985e62990

  • SHA256

    01dace0158978bb8672459d3012ded3b5dbb3d9504f16507381598e783ee0c34

  • SHA512

    fd8e19458754cf11522b9811b07ebbbec4da12ec9ec056df2d8de771fb96cce0b169de8dd0a4443296dd467f0b2063fe837e961fc4bec83e0b800021caff408f

Malware Config

Targets

    • Target

      01dace0158978bb8672459d3012ded3b5dbb3d9504f16507381598e783ee0c34

    • Size

      263KB

    • MD5

      81deb3b71b3f44659347350f6d39dd05

    • SHA1

      c4c1a407b6d2596bf55f352e2d013fe985e62990

    • SHA256

      01dace0158978bb8672459d3012ded3b5dbb3d9504f16507381598e783ee0c34

    • SHA512

      fd8e19458754cf11522b9811b07ebbbec4da12ec9ec056df2d8de771fb96cce0b169de8dd0a4443296dd467f0b2063fe837e961fc4bec83e0b800021caff408f

    • Cerber

      Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

    • Modifies visiblity of hidden/system files in Explorer

    • suricata: ET MALWARE Ransomware/Cerber Checkin 2

      suricata: ET MALWARE Ransomware/Cerber Checkin 2

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Adds policy Run key to start application

    • Contacts a large (514) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (526) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

3
T1112

File Deletion

2
T1107

Credential Access

Credentials in Files

1
T1081

Discovery

Network Service Scanning

2
T1046

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

3
T1490

Tasks