General
-
Target
1754d64016c758a65cb85df328ffd502a7255a6855d976e3bdeb497f95201848
-
Size
663KB
-
Sample
220608-z6yeeshgdp
-
MD5
259716fa526d79543988edace76417a7
-
SHA1
d932ebd91d7ce77bb7be00abbb308c1cb3961d2b
-
SHA256
1754d64016c758a65cb85df328ffd502a7255a6855d976e3bdeb497f95201848
-
SHA512
e639e7c73f8e78f1cc01801673245c303943195f2d39aa0da00104bfba4c69dfaea35d733824f73776beb8691421c207f8e314609942ff502f7c2c52377b5820
-
SSDEEP
12288:HPSEujS44WCfXXQIhA+NlM5Chr9rNLP1PCZK099CAYVZ:HMS4/0Xvh/lM54N7CZKC9CBz
Static task
static1
Behavioral task
behavioral1
Sample
1754d64016c758a65cb85df328ffd502a7255a6855d976e3bdeb497f95201848.exe
Resource
win7-20220414-en
Malware Config
Extracted
loaderbot
http://179.43.147.227/mine/cmd.php
Targets
-
-
Target
1754d64016c758a65cb85df328ffd502a7255a6855d976e3bdeb497f95201848
-
Size
663KB
-
MD5
259716fa526d79543988edace76417a7
-
SHA1
d932ebd91d7ce77bb7be00abbb308c1cb3961d2b
-
SHA256
1754d64016c758a65cb85df328ffd502a7255a6855d976e3bdeb497f95201848
-
SHA512
e639e7c73f8e78f1cc01801673245c303943195f2d39aa0da00104bfba4c69dfaea35d733824f73776beb8691421c207f8e314609942ff502f7c2c52377b5820
-
SSDEEP
12288:HPSEujS44WCfXXQIhA+NlM5Chr9rNLP1PCZK099CAYVZ:HMS4/0Xvh/lM54N7CZKC9CBz
-
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
suricata: ET MALWARE CerberTear Ransomware CnC Checkin
-
LoaderBot executable
-
XMRig Miner payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-