General
-
Target
2025-01-10_cf1e5739e38d05964c529a5cd7a627d7_cerber
-
Size
650KB
-
Sample
250110-q3q2haxrdp
-
MD5
cf1e5739e38d05964c529a5cd7a627d7
-
SHA1
f20ec960cae50a8093e60d01d5d730a6ccf85ab2
-
SHA256
11e3f0ff5df320791a49be0a02a398a406d95bcc528732d0ff2b72ba13ec5959
-
SHA512
18e9f348dd87eea80f1c0f977716fd3fe5bdd698489bce1b461215ae08af4fe3a1a94e483c8a44b1842c67f8e4e936d747194f4ade6808a88c1c012bbcc77689
-
SSDEEP
12288:LeySOCn73uSYcAEDCNBcXBuEE8SzoeMhqyfjt:5SOC7uSnAEDJXTEb6X5
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_cf1e5739e38d05964c529a5cd7a627d7_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-10_cf1e5739e38d05964c529a5cd7a627d7_cerber.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_SI3L3RU_.txt
http://hjhqmbxyinislkkt.onion/A93C-CEAD-52F2-0501-FDFC
http://hjhqmbxyinislkkt.1gu5um.top/A93C-CEAD-52F2-0501-FDFC
http://hjhqmbxyinislkkt.1w5iy8.top/A93C-CEAD-52F2-0501-FDFC
http://hjhqmbxyinislkkt.1aajb7.top/A93C-CEAD-52F2-0501-FDFC
http://hjhqmbxyinislkkt.1nm62r.top/A93C-CEAD-52F2-0501-FDFC
http://hjhqmbxyinislkkt.1efxa8.top/A93C-CEAD-52F2-0501-FDFC
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_87GIE_.hta
cerber
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_5VRO4WL_.txt
http://hjhqmbxyinislkkt.onion/FEE8-5D49-3613-0501-FB7C
http://hjhqmbxyinislkkt.1gu5um.top/FEE8-5D49-3613-0501-FB7C
http://hjhqmbxyinislkkt.1w5iy8.top/FEE8-5D49-3613-0501-FB7C
http://hjhqmbxyinislkkt.1aajb7.top/FEE8-5D49-3613-0501-FB7C
http://hjhqmbxyinislkkt.1nm62r.top/FEE8-5D49-3613-0501-FB7C
http://hjhqmbxyinislkkt.1efxa8.top/FEE8-5D49-3613-0501-FB7C
Targets
-
-
Target
2025-01-10_cf1e5739e38d05964c529a5cd7a627d7_cerber
-
Size
650KB
-
MD5
cf1e5739e38d05964c529a5cd7a627d7
-
SHA1
f20ec960cae50a8093e60d01d5d730a6ccf85ab2
-
SHA256
11e3f0ff5df320791a49be0a02a398a406d95bcc528732d0ff2b72ba13ec5959
-
SHA512
18e9f348dd87eea80f1c0f977716fd3fe5bdd698489bce1b461215ae08af4fe3a1a94e483c8a44b1842c67f8e4e936d747194f4ade6808a88c1c012bbcc77689
-
SSDEEP
12288:LeySOCn73uSYcAEDCNBcXBuEE8SzoeMhqyfjt:5SOC7uSnAEDJXTEb6X5
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2