General

  • Target

    5668e6a044b5982f1c2e542dc6cbdb065c35bf0555cc684e374004ac67ba23a1

  • Size

    211KB

  • Sample

    220725-d2rkesdafq

  • MD5

    3c9c3f967aafcae7e3831205a0118b9e

  • SHA1

    1bd361aefbd04b84c48937a14b5318806897e4a5

  • SHA256

    5668e6a044b5982f1c2e542dc6cbdb065c35bf0555cc684e374004ac67ba23a1

  • SHA512

    165d4c457ca5a7a82c77ca3c98c42b76eb13cd4374c11a5895013b64c315ecefdd78dd978a16f0daac28289d21d2079629233f664849ef71e7284b783fe255ec

Malware Config

Targets

    • Target

      5668e6a044b5982f1c2e542dc6cbdb065c35bf0555cc684e374004ac67ba23a1

    • Size

      211KB

    • MD5

      3c9c3f967aafcae7e3831205a0118b9e

    • SHA1

      1bd361aefbd04b84c48937a14b5318806897e4a5

    • SHA256

      5668e6a044b5982f1c2e542dc6cbdb065c35bf0555cc684e374004ac67ba23a1

    • SHA512

      165d4c457ca5a7a82c77ca3c98c42b76eb13cd4374c11a5895013b64c315ecefdd78dd978a16f0daac28289d21d2079629233f664849ef71e7284b783fe255ec

    • suricata: ET MALWARE Ransomware/Cerber Checkin 2

      suricata: ET MALWARE Ransomware/Cerber Checkin 2

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Contacts a large (512) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (525) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Credential Access

Credentials in Files

1
T1081

Discovery

Network Service Scanning

2
T1046

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Tasks