General
-
Target
2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber
-
Size
651KB
-
Sample
241221-s5xm6sskcv
-
MD5
2249a5da313044cccd423e1b716b0b58
-
SHA1
0e6d626dd1edf0340e3afd9fcdbb52044d1fb0f3
-
SHA256
04bd22270af43b1e07cc737c523f493805082f280bc58f4ff3937a516c1fc5cf
-
SHA512
8824e0c9a4cb40f9f261d5960d43f0bec9294d89b94ab7856068ad3725e6b4c009fdc4338de21f83afe9a28bef702dd001a9c4117fbbbbdf2ae034d1740079bd
-
SSDEEP
12288:feySOCn73uSYcAEDCNBcXUME8oOoeMhqCk:dSOC7uSnAEDJX3EVu6Fk
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_B5MN_.txt
http://hjhqmbxyinislkkt.onion/8DD4-FCC8-6ECD-0093-CA1D
http://hjhqmbxyinislkkt.1eagrj.top/8DD4-FCC8-6ECD-0093-CA1D
http://hjhqmbxyinislkkt.1a2xx3.top/8DD4-FCC8-6ECD-0093-CA1D
http://hjhqmbxyinislkkt.1gu5um.top/8DD4-FCC8-6ECD-0093-CA1D
http://hjhqmbxyinislkkt.1w5iy8.top/8DD4-FCC8-6ECD-0093-CA1D
http://hjhqmbxyinislkkt.1aajb7.top/8DD4-FCC8-6ECD-0093-CA1D
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_91UF6UE_.txt
http://hjhqmbxyinislkkt.onion/3EA6-DEAA-3C6A-0093-CA4D
http://hjhqmbxyinislkkt.1eagrj.top/3EA6-DEAA-3C6A-0093-CA4D
http://hjhqmbxyinislkkt.1a2xx3.top/3EA6-DEAA-3C6A-0093-CA4D
http://hjhqmbxyinislkkt.1gu5um.top/3EA6-DEAA-3C6A-0093-CA4D
http://hjhqmbxyinislkkt.1w5iy8.top/3EA6-DEAA-3C6A-0093-CA4D
http://hjhqmbxyinislkkt.1aajb7.top/3EA6-DEAA-3C6A-0093-CA4D
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_1GLR_.hta
cerber
Targets
-
-
Target
2024-12-21_2249a5da313044cccd423e1b716b0b58_cerber
-
Size
651KB
-
MD5
2249a5da313044cccd423e1b716b0b58
-
SHA1
0e6d626dd1edf0340e3afd9fcdbb52044d1fb0f3
-
SHA256
04bd22270af43b1e07cc737c523f493805082f280bc58f4ff3937a516c1fc5cf
-
SHA512
8824e0c9a4cb40f9f261d5960d43f0bec9294d89b94ab7856068ad3725e6b4c009fdc4338de21f83afe9a28bef702dd001a9c4117fbbbbdf2ae034d1740079bd
-
SSDEEP
12288:feySOCn73uSYcAEDCNBcXUME8oOoeMhqCk:dSOC7uSnAEDJX3EVu6Fk
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2