General

  • Target

    nebula.exe

  • Size

    1.5MB

  • Sample

    241030-rrc6yawqfk

  • MD5

    aa84466da5167860bd89a6d2e233e742

  • SHA1

    74032d059df6b905a8dd910a81bf9bd6b7f0f4a2

  • SHA256

    be8ac2b53a5fbe04d599dd8c05cd7c29ef77bfd77d000982c04208954fceb27e

  • SHA512

    a9f4128f5470c2ed92d491f5e7506a8246ac41aed90e5cceabe608979ae708056c12e0806688396e0798c1c0bca1c953f68d845f49465dcde8fbbf7f35408ea7

  • SSDEEP

    24576:XRiOcwpQZ3/G7PMuKn2vyedkShQb06qnu7PReN/IAUqNOmNAFwa/k:YOcwYPne1dvQbwnurA3s/

Malware Config

Targets

    • Target

      nebula.exe

    • Size

      1.5MB

    • MD5

      aa84466da5167860bd89a6d2e233e742

    • SHA1

      74032d059df6b905a8dd910a81bf9bd6b7f0f4a2

    • SHA256

      be8ac2b53a5fbe04d599dd8c05cd7c29ef77bfd77d000982c04208954fceb27e

    • SHA512

      a9f4128f5470c2ed92d491f5e7506a8246ac41aed90e5cceabe608979ae708056c12e0806688396e0798c1c0bca1c953f68d845f49465dcde8fbbf7f35408ea7

    • SSDEEP

      24576:XRiOcwpQZ3/G7PMuKn2vyedkShQb06qnu7PReN/IAUqNOmNAFwa/k:YOcwYPne1dvQbwnurA3s/

    • Cerber

      Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

    • Cerber family

    • Sets service image path in registry

    • Stops running service(s)

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks