General
-
Target
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber
-
Size
408KB
-
Sample
250112-1l6ezatkbj
-
MD5
6d0a34c6f2079c8d418ec4e8b6c77812
-
SHA1
ed91c7d27cb01919f905aa5e9ca1966ddcee32a9
-
SHA256
db0d7dc1c5ae8d9a03f9caf9a79dd92b5103bcfa75da00b48a071dca887ed9fa
-
SHA512
33923ea6e033448476edcbf51f48f30a28a644771c53150d7f504ce72112c711a1dcb36ec5c486cb1ab2c05c468cae15aba831d0d98600d06a8c75431ee7dc96
-
SSDEEP
6144:45W8AUzdhpUIdjsq0YI9Wr9yEjHbJcaFK7aM71tz+E:45eUzdhqs0Yn7J1FattKE
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\README.hta
Extracted
C:\Users\Admin\Downloads\README.hta
Targets
-
-
Target
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber
-
Size
408KB
-
MD5
6d0a34c6f2079c8d418ec4e8b6c77812
-
SHA1
ed91c7d27cb01919f905aa5e9ca1966ddcee32a9
-
SHA256
db0d7dc1c5ae8d9a03f9caf9a79dd92b5103bcfa75da00b48a071dca887ed9fa
-
SHA512
33923ea6e033448476edcbf51f48f30a28a644771c53150d7f504ce72112c711a1dcb36ec5c486cb1ab2c05c468cae15aba831d0d98600d06a8c75431ee7dc96
-
SSDEEP
6144:45W8AUzdhpUIdjsq0YI9Wr9yEjHbJcaFK7aM71tz+E:45eUzdhqs0Yn7J1FattKE
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (1097) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1