General
-
Target
33842966256e6ad79cb3cb03d9e190b17aa1b225a95289f387396e02e5af80aaN
-
Size
311KB
-
Sample
241105-cm98js1qfz
-
MD5
a299bb3e2e868a3862c5352542979240
-
SHA1
3ceb105b75611610f6cf1eefe3b918420353f065
-
SHA256
33842966256e6ad79cb3cb03d9e190b17aa1b225a95289f387396e02e5af80aa
-
SHA512
2a5e5f725d286b726409a7270e2ade74c26c27464dd2aad16aab234e030f7b9c077c1a3c94ff1f45a5e196aacd2dee8ce6ad3c5ef0abece6b2d2f3c2ca2ebec3
-
SSDEEP
6144:Tf1g8dVoLtpzFMO0XGuaBxfwLUncgESZemE2:TfG8dVgtpRfN4ocwv9
Static task
static1
Behavioral task
behavioral1
Sample
33842966256e6ad79cb3cb03d9e190b17aa1b225a95289f387396e02e5af80aaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33842966256e6ad79cb3cb03d9e190b17aa1b225a95289f387396e02e5af80aaN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\README.hta
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\README.hta
Targets
-
-
Target
33842966256e6ad79cb3cb03d9e190b17aa1b225a95289f387396e02e5af80aaN
-
Size
311KB
-
MD5
a299bb3e2e868a3862c5352542979240
-
SHA1
3ceb105b75611610f6cf1eefe3b918420353f065
-
SHA256
33842966256e6ad79cb3cb03d9e190b17aa1b225a95289f387396e02e5af80aa
-
SHA512
2a5e5f725d286b726409a7270e2ade74c26c27464dd2aad16aab234e030f7b9c077c1a3c94ff1f45a5e196aacd2dee8ce6ad3c5ef0abece6b2d2f3c2ca2ebec3
-
SSDEEP
6144:Tf1g8dVoLtpzFMO0XGuaBxfwLUncgESZemE2:TfG8dVgtpRfN4ocwv9
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1