General

  • Target

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

  • Size

    382KB

  • Sample

    220725-gtsz3aaabp

  • MD5

    432ad4941c057927786e3b6646ecf2f3

  • SHA1

    45babe449954544219054e327523de5812597eaa

  • SHA256

    5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

  • SHA512

    8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

Malware Config

Targets

    • Target

      5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

    • Size

      382KB

    • MD5

      432ad4941c057927786e3b6646ecf2f3

    • SHA1

      45babe449954544219054e327523de5812597eaa

    • SHA256

      5607414907c0494f734000ba029c6b74a0eafdf2bfbecc24d410855108635100

    • SHA512

      8b8fa755cf8a18fe7a822edcb977e8d8ee7615ccc56f5eac5c4eb7113f1faa8c983a9da18a08923c7e14d1bc86f2cae7d0a98322e8fcb8fb180733c0e9b04ab3

    • Cerber

      Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

    • Modifies visiblity of hidden/system files in Explorer

    • suricata: ET MALWARE Ransomware/Cerber Checkin 2

      suricata: ET MALWARE Ransomware/Cerber Checkin 2

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Adds policy Run key to start application

    • Contacts a large (514) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (530) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

3
T1112

File Deletion

2
T1107

Credential Access

Credentials in Files

1
T1081

Discovery

Network Service Scanning

2
T1046

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

3
T1490

Tasks