General
-
Target
2025-01-10_9b370aa30024e5dd0b9e14c3774de914_cerber
-
Size
650KB
-
Sample
250110-qtwkmaxpdk
-
MD5
9b370aa30024e5dd0b9e14c3774de914
-
SHA1
3915f2ebe90d1be473290059b0e59997d4c4febe
-
SHA256
12609d71c004ad4b262287771b98a2eb98032e32672b8b39861329e44d2fa8ee
-
SHA512
b759810a90c7038f6c3bee384a7e179cee0c116ec1151d6b5e30dbba465c1274a5c4a166de224d2c4abc5985d5ccc46ae783bc8a9a9c54c8341af6ba04688cfa
-
SSDEEP
12288:geySOCn73uSYcAEDCNBcXhuEE8YLoeMhq5fjw:aSOC7uSnAEDJXzEt6kU
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_9b370aa30024e5dd0b9e14c3774de914_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-10_9b370aa30024e5dd0b9e14c3774de914_cerber.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_VE3Q44C_.txt
http://hjhqmbxyinislkkt.onion/7E2A-B1EE-FCB8-05C3-CD03
http://hjhqmbxyinislkkt.1gu5um.top/7E2A-B1EE-FCB8-05C3-CD03
http://hjhqmbxyinislkkt.1w5iy8.top/7E2A-B1EE-FCB8-05C3-CD03
http://hjhqmbxyinislkkt.1aajb7.top/7E2A-B1EE-FCB8-05C3-CD03
http://hjhqmbxyinislkkt.1nm62r.top/7E2A-B1EE-FCB8-05C3-CD03
http://hjhqmbxyinislkkt.1efxa8.top/7E2A-B1EE-FCB8-05C3-CD03
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_4547XA_.txt
http://hjhqmbxyinislkkt.onion/3A7E-2608-80EB-05C3-C9C3
http://hjhqmbxyinislkkt.1gu5um.top/3A7E-2608-80EB-05C3-C9C3
http://hjhqmbxyinislkkt.1w5iy8.top/3A7E-2608-80EB-05C3-C9C3
http://hjhqmbxyinislkkt.1aajb7.top/3A7E-2608-80EB-05C3-C9C3
http://hjhqmbxyinislkkt.1nm62r.top/3A7E-2608-80EB-05C3-C9C3
http://hjhqmbxyinislkkt.1efxa8.top/3A7E-2608-80EB-05C3-C9C3
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_8LARQ_.hta
cerber
Targets
-
-
Target
2025-01-10_9b370aa30024e5dd0b9e14c3774de914_cerber
-
Size
650KB
-
MD5
9b370aa30024e5dd0b9e14c3774de914
-
SHA1
3915f2ebe90d1be473290059b0e59997d4c4febe
-
SHA256
12609d71c004ad4b262287771b98a2eb98032e32672b8b39861329e44d2fa8ee
-
SHA512
b759810a90c7038f6c3bee384a7e179cee0c116ec1151d6b5e30dbba465c1274a5c4a166de224d2c4abc5985d5ccc46ae783bc8a9a9c54c8341af6ba04688cfa
-
SSDEEP
12288:geySOCn73uSYcAEDCNBcXhuEE8YLoeMhq5fjw:aSOC7uSnAEDJXzEt6kU
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2