General
-
Target
1f824766e7bbd6a8ea293d4fc0f8b4b09d541bd0c1bc54fcdcf3e67fcc38133b
-
Size
292KB
-
Sample
250111-ly893avrc1
-
MD5
8e9080262723020463638de9db275baa
-
SHA1
488b4efe98d351989c8171e3021e502640f7812e
-
SHA256
1f824766e7bbd6a8ea293d4fc0f8b4b09d541bd0c1bc54fcdcf3e67fcc38133b
-
SHA512
f22d6d87867e0973740c7e95f3e25281f45c8aadd1512e6cb4fba155f7174690252a5796132d02ed0ca8be9a9691a4fecaf8ef69e562ed7551d723486709bb90
-
SSDEEP
6144:znrYwBVSU8vKzlf9k6Fn/SnfyjB/stR2vvpzC/gs6Apz9:TrlBwUmKzV9ZFnhkmxzgD37
Static task
static1
Behavioral task
behavioral1
Sample
1f824766e7bbd6a8ea293d4fc0f8b4b09d541bd0c1bc54fcdcf3e67fcc38133b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1f824766e7bbd6a8ea293d4fc0f8b4b09d541bd0c1bc54fcdcf3e67fcc38133b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___04RADM_.txt
cerber
http://xpcx6erilkjced3j.onion/5A26-8F75-BE62-0098-9637
http://xpcx6erilkjced3j.1t2jhk.top/5A26-8F75-BE62-0098-9637
http://xpcx6erilkjced3j.1e6ly3.top/5A26-8F75-BE62-0098-9637
http://xpcx6erilkjced3j.1ewuh5.top/5A26-8F75-BE62-0098-9637
http://xpcx6erilkjced3j.15ezkm.top/5A26-8F75-BE62-0098-9637
http://xpcx6erilkjced3j.16umxg.top/5A26-8F75-BE62-0098-9637
Targets
-
-
Target
1f824766e7bbd6a8ea293d4fc0f8b4b09d541bd0c1bc54fcdcf3e67fcc38133b
-
Size
292KB
-
MD5
8e9080262723020463638de9db275baa
-
SHA1
488b4efe98d351989c8171e3021e502640f7812e
-
SHA256
1f824766e7bbd6a8ea293d4fc0f8b4b09d541bd0c1bc54fcdcf3e67fcc38133b
-
SHA512
f22d6d87867e0973740c7e95f3e25281f45c8aadd1512e6cb4fba155f7174690252a5796132d02ed0ca8be9a9691a4fecaf8ef69e562ed7551d723486709bb90
-
SSDEEP
6144:znrYwBVSU8vKzlf9k6Fn/SnfyjB/stR2vvpzC/gs6Apz9:TrlBwUmKzV9ZFnhkmxzgD37
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1097) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Deletes itself
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1