General
-
Target
0e9cd15ccb6544acd6c9f95dd70a65160587d87ccfe9221428d4011c36c56875
-
Size
219KB
-
Sample
250107-ystzeawnew
-
MD5
29352905742f6b98813fdaddd1441d8d
-
SHA1
ce441e8ee52ca672ffd4e81988a8c50c37ee13c6
-
SHA256
0e9cd15ccb6544acd6c9f95dd70a65160587d87ccfe9221428d4011c36c56875
-
SHA512
f5aaf6e0d793e3e051ef2a596860f66d0e38603c5d373736e068ad6df445494aa6ed466e6bc8ef3cd4afbff578159340cba49979585d854a7c3df1dbfb691f89
-
SSDEEP
6144:/2bEQe7HoQFAL976rDLt0QJu0QMjICG/6WGAL:wmLL6GrKQzQMjIJWM
Static task
static1
Behavioral task
behavioral1
Sample
0e9cd15ccb6544acd6c9f95dd70a65160587d87ccfe9221428d4011c36c56875.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0e9cd15ccb6544acd6c9f95dd70a65160587d87ccfe9221428d4011c36c56875.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\README.hta
Extracted
C:\Users\Admin\AppData\Roaming\README.hta
Targets
-
-
Target
0e9cd15ccb6544acd6c9f95dd70a65160587d87ccfe9221428d4011c36c56875
-
Size
219KB
-
MD5
29352905742f6b98813fdaddd1441d8d
-
SHA1
ce441e8ee52ca672ffd4e81988a8c50c37ee13c6
-
SHA256
0e9cd15ccb6544acd6c9f95dd70a65160587d87ccfe9221428d4011c36c56875
-
SHA512
f5aaf6e0d793e3e051ef2a596860f66d0e38603c5d373736e068ad6df445494aa6ed466e6bc8ef3cd4afbff578159340cba49979585d854a7c3df1dbfb691f89
-
SSDEEP
6144:/2bEQe7HoQFAL976rDLt0QJu0QMjICG/6WGAL:wmLL6GrKQzQMjIJWM
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (1031) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1