General
-
Target
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber
-
Size
660KB
-
Sample
250110-qw2vesxqap
-
MD5
8a61458e6ac4304f8e1eb9af490f5eaf
-
SHA1
32c87c24746d0ee330f7d25b55b96c808d25f5b4
-
SHA256
12bace7eccbe03cf3a70d9d5579b2cdde4161f3e15aaee58ec3f39acd708f697
-
SHA512
4c382442207aa7ce4a6045afcade58ee508563fe147f09a2d5c7443d6be4ccea67e2c05cbca59a7a135922b0ed5a272988eaec68634ab142188f290bfe4c9565
-
SSDEEP
12288:keySOCn73uSYcAEDCNBcXkME8ICoeMhqO1:eSOC7uSnAEDJXnE7K691
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_BIUIV_.txt
http://hjhqmbxyinislkkt.onion/B82C-3D03-1201-05C4-05AC
http://hjhqmbxyinislkkt.1eagrj.top/B82C-3D03-1201-05C4-05AC
http://hjhqmbxyinislkkt.1a2xx3.top/B82C-3D03-1201-05C4-05AC
http://hjhqmbxyinislkkt.1gu5um.top/B82C-3D03-1201-05C4-05AC
http://hjhqmbxyinislkkt.1w5iy8.top/B82C-3D03-1201-05C4-05AC
http://hjhqmbxyinislkkt.1aajb7.top/B82C-3D03-1201-05C4-05AC
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_IHV1E7_.hta
cerber
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_C2OCN2B_.txt
http://hjhqmbxyinislkkt.onion/A53A-3F7C-F83F-05C4-04E9
http://hjhqmbxyinislkkt.1eagrj.top/A53A-3F7C-F83F-05C4-04E9
http://hjhqmbxyinislkkt.1a2xx3.top/A53A-3F7C-F83F-05C4-04E9
http://hjhqmbxyinislkkt.1gu5um.top/A53A-3F7C-F83F-05C4-04E9
http://hjhqmbxyinislkkt.1w5iy8.top/A53A-3F7C-F83F-05C4-04E9
http://hjhqmbxyinislkkt.1aajb7.top/A53A-3F7C-F83F-05C4-04E9
Targets
-
-
Target
2025-01-10_8a61458e6ac4304f8e1eb9af490f5eaf_cerber
-
Size
660KB
-
MD5
8a61458e6ac4304f8e1eb9af490f5eaf
-
SHA1
32c87c24746d0ee330f7d25b55b96c808d25f5b4
-
SHA256
12bace7eccbe03cf3a70d9d5579b2cdde4161f3e15aaee58ec3f39acd708f697
-
SHA512
4c382442207aa7ce4a6045afcade58ee508563fe147f09a2d5c7443d6be4ccea67e2c05cbca59a7a135922b0ed5a272988eaec68634ab142188f290bfe4c9565
-
SSDEEP
12288:keySOCn73uSYcAEDCNBcXkME8ICoeMhqO1:eSOC7uSnAEDJXnE7K691
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2