General
-
Target
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770
-
Size
276KB
-
Sample
241224-xyqnhavlhq
-
MD5
685d1b61e34fdff8ebd5e1ad7d7a62ae
-
SHA1
e8dc6e16901372dd70f9472a5965e6ec3c39e7e5
-
SHA256
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770
-
SHA512
754e3a3e74f83733e08aa0830e154b790a5f9c71b7e952013078142c73702c680beb561190b4778ce33ae9192a82b7bff916c31bb83b80cc46d00ee83f09be99
-
SSDEEP
6144:T28A9pceLeNFNYe3ipeVcq1ycyIvNLF/pDQOted5fJMiwT5g:y8GZLeN/d3tcZmP/pkAw5m5g
Static task
static1
Behavioral task
behavioral1
Sample
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
pastelists.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
pastelists.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_EET64NM_.txt
http://hjhqmbxyinislkkt.onion/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.18f5bw.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.1qk2un.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.1xynaz.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.1gunao.top/EC98-C36B-E92D-0502-0019
http://hjhqmbxyinislkkt.19b6nk.top/EC98-C36B-E92D-0502-0019
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_YJ1HSXEO_.hta
cerber
Targets
-
-
Target
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770
-
Size
276KB
-
MD5
685d1b61e34fdff8ebd5e1ad7d7a62ae
-
SHA1
e8dc6e16901372dd70f9472a5965e6ec3c39e7e5
-
SHA256
09a767d035324bd59208de294d8dfbb9f82193649d4bc5de802ff16aef8a0770
-
SHA512
754e3a3e74f83733e08aa0830e154b790a5f9c71b7e952013078142c73702c680beb561190b4778ce33ae9192a82b7bff916c31bb83b80cc46d00ee83f09be99
-
SSDEEP
6144:T28A9pceLeNFNYe3ipeVcq1ycyIvNLF/pDQOted5fJMiwT5g:y8GZLeN/d3tcZmP/pkAw5m5g
Score10/10-
Cerber family
-
Contacts a large (1097) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
4d3b19a81bd51f8ce44b93643a4e3a99
-
SHA1
35f8b00e85577b014080df98bd2c378351d9b3e9
-
SHA256
fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
-
SHA512
b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
SSDEEP
192:BPtkumJX7zB22kGwfy0mtVgkCPOse1un:u702k5qpdseQn
Score3/10 -
-
-
Target
pastelists.dll
-
Size
180KB
-
MD5
f2048d943f0965532b8473c445991a5c
-
SHA1
09504be04e8e8980698350e5b0713ebb52963e44
-
SHA256
bc9d70d641f5bd5ff5d5686417ee9569d252bcd1f2ff6c5e4972babb9610ac43
-
SHA512
97d0fca60c89cd3c2381dc285b525d3221a32a871e58c3cbf971bed9eb65927ef9c98872a39c9d6f5a15b4e209e177ba3ac45b91797f900b5539c32087a360c5
-
SSDEEP
3072:AkUzg4zIOyKQTHsQwc4AJuJbVsJTigBX2bSanbN9ilckjG/PGpktd7g:rUU4zKKQDsQ3iMX2bSozihk7
Score3/10 -