Static task
static1
Behavioral task
behavioral1
Sample
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber
-
Size
408KB
-
MD5
6d0a34c6f2079c8d418ec4e8b6c77812
-
SHA1
ed91c7d27cb01919f905aa5e9ca1966ddcee32a9
-
SHA256
db0d7dc1c5ae8d9a03f9caf9a79dd92b5103bcfa75da00b48a071dca887ed9fa
-
SHA512
33923ea6e033448476edcbf51f48f30a28a644771c53150d7f504ce72112c711a1dcb36ec5c486cb1ab2c05c468cae15aba831d0d98600d06a8c75431ee7dc96
-
SSDEEP
6144:45W8AUzdhpUIdjsq0YI9Wr9yEjHbJcaFK7aM71tz+E:45eUzdhqs0Yn7J1FattKE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber
Files
-
2025-01-12_6d0a34c6f2079c8d418ec4e8b6c77812_cerber.exe windows:5 windows x86 arch:x86
ce048b8d45148d4ed432eafea067c802
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
GetTickCount
GetFileAttributesA
GetCurrentProcessId
GetDriveTypeW
GetLastError
LoadLibraryW
GetModuleHandleA
FindClose
FreeLibrary
SetCurrentDirectoryW
GetFileAttributesW
GetProcAddress
GetDriveTypeA
user32
SetForegroundWindow
SetWindowTextA
ShowWindow
PostQuitMessage
MessageBoxA
GetSysColor
GetDlgItemTextA
CharPrevA
LoadIconA
DestroyIcon
DestroyWindow
LoadIconW
advapi32
RegOpenKeyW
RegQueryValueExW
shell32
DragQueryPoint
SHGetPathFromIDListW
DragFinish
DragAcceptFiles
DragQueryFileW
Sections
.text Size: 319KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ