General
-
Target
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
-
Size
621KB
-
Sample
240725-exdy7s1ele
-
MD5
0a4fdcaa0f4966b387fbfb9b8248fd7d
-
SHA1
56239da8077f97b837222d855273095779b638cd
-
SHA256
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea
-
SHA512
aa57096f7b060ff3afdc9347e8a4242e4daa837f96ac18788c8cc0751f7582fb2815b3a3b40af3ee0a8904a300148e848e531e069d367544ddba19ef40173941
-
SSDEEP
6144:HYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsRZ:HYKlYmDXEpDHRXP01
Static task
static1
Behavioral task
behavioral1
Sample
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___PAGHI_.txt
cerber
http://p27dokhpz2n7nvgr.onion/C281-6E58-C03C-0446-9202
http://p27dokhpz2n7nvgr.12hygy.top/C281-6E58-C03C-0446-9202
http://p27dokhpz2n7nvgr.14ewqv.top/C281-6E58-C03C-0446-9202
http://p27dokhpz2n7nvgr.14vvrc.top/C281-6E58-C03C-0446-9202
http://p27dokhpz2n7nvgr.129p1t.top/C281-6E58-C03C-0446-9202
http://p27dokhpz2n7nvgr.1apgrn.top/C281-6E58-C03C-0446-9202
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___78H0MQK_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___59I0_.txt
cerber
http://p27dokhpz2n7nvgr.onion/DC10-A966-522B-0446-90F8
http://p27dokhpz2n7nvgr.12hygy.top/DC10-A966-522B-0446-90F8
http://p27dokhpz2n7nvgr.14ewqv.top/DC10-A966-522B-0446-90F8
http://p27dokhpz2n7nvgr.14vvrc.top/DC10-A966-522B-0446-90F8
http://p27dokhpz2n7nvgr.129p1t.top/DC10-A966-522B-0446-90F8
http://p27dokhpz2n7nvgr.1apgrn.top/DC10-A966-522B-0446-90F8
Targets
-
-
Target
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea.exe
-
Size
621KB
-
MD5
0a4fdcaa0f4966b387fbfb9b8248fd7d
-
SHA1
56239da8077f97b837222d855273095779b638cd
-
SHA256
8139a1abf1b69e34499158be4dd7e73335c67b275b531061d8f3ce1acb8b13ea
-
SHA512
aa57096f7b060ff3afdc9347e8a4242e4daa837f96ac18788c8cc0751f7582fb2815b3a3b40af3ee0a8904a300148e848e531e069d367544ddba19ef40173941
-
SSDEEP
6144:HYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsRZ:HYKlYmDXEpDHRXP01
-
Blocklisted process makes network request
-
Contacts a large (1097) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2