General

  • Target

    0152bfcdac11ead27ab283963a236c0bd218f25de21135d487dd83e4b8af0047

  • Size

    372KB

  • Sample

    220523-y6g7rsfbb3

  • MD5

    00550cbf30648b09a6e64f436e6c2bf4

  • SHA1

    aba94637d885e13d820660dc5b5fb9bf83fc743f

  • SHA256

    0152bfcdac11ead27ab283963a236c0bd218f25de21135d487dd83e4b8af0047

  • SHA512

    a4d473f50bb0e0f8e383c25141ac742584f8eb1b95e1b1b9f6df71836ee6ab5b53b305ae30ac06e7495b80372f52d982e998edd61cfb01c364ab935aab083e3e

Malware Config

Targets

    • Target

      0152bfcdac11ead27ab283963a236c0bd218f25de21135d487dd83e4b8af0047

    • Size

      372KB

    • MD5

      00550cbf30648b09a6e64f436e6c2bf4

    • SHA1

      aba94637d885e13d820660dc5b5fb9bf83fc743f

    • SHA256

      0152bfcdac11ead27ab283963a236c0bd218f25de21135d487dd83e4b8af0047

    • SHA512

      a4d473f50bb0e0f8e383c25141ac742584f8eb1b95e1b1b9f6df71836ee6ab5b53b305ae30ac06e7495b80372f52d982e998edd61cfb01c364ab935aab083e3e

    • suricata: ET MALWARE Ransomware/Cerber Checkin 2

      suricata: ET MALWARE Ransomware/Cerber Checkin 2

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Contacts a large (512) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (529) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Discovery

Network Service Scanning

2
T1046

Impact

Inhibit System Recovery

1
T1490

Tasks