General
-
Target
f20519ad5ba1ffa084da05bdebb97d951651714cf4e4710f7441683301918ab8
-
Size
446KB
-
Sample
250117-lvsg5s1qhz
-
MD5
04509ce200349370e706c4e6898f67c2
-
SHA1
297a51753258c912192caaa895f47660144124be
-
SHA256
f20519ad5ba1ffa084da05bdebb97d951651714cf4e4710f7441683301918ab8
-
SHA512
3b128329c7b7cdea6aef251a7517716f4159e3ced558a9be0c1a964b8bada89f7cbc48f171147ec443b8b174f1d8db8d6892e0cb430d7428e65d5b037ef873c2
-
SSDEEP
6144:8R4GbVOUtKXVgcNX3RVR+64R8cog9kqn2KRmgWDVb/ii4mnj0De0z:GpVuSG9+VRTYgAx/Jj0z
Static task
static1
Behavioral task
behavioral1
Sample
f20519ad5ba1ffa084da05bdebb97d951651714cf4e4710f7441683301918ab8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f20519ad5ba1ffa084da05bdebb97d951651714cf4e4710f7441683301918ab8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_ASZYRV_.txt
http://hjhqmbxyinislkkt.onion/EFAA-622A-BB26-0502-9DAD
http://hjhqmbxyinislkkt.1fzjn3.top/EFAA-622A-BB26-0502-9DAD
http://hjhqmbxyinislkkt.15e8hv.top/EFAA-622A-BB26-0502-9DAD
http://hjhqmbxyinislkkt.19xvyd.top/EFAA-622A-BB26-0502-9DAD
http://hjhqmbxyinislkkt.1mwvgh.top/EFAA-622A-BB26-0502-9DAD
http://hjhqmbxyinislkkt.1fygsg.top/EFAA-622A-BB26-0502-9DAD
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_U7UD038R_.txt
http://hjhqmbxyinislkkt.onion/BF63-AD56-7BFD-0502-9FBC
http://hjhqmbxyinislkkt.1fzjn3.top/BF63-AD56-7BFD-0502-9FBC
http://hjhqmbxyinislkkt.15e8hv.top/BF63-AD56-7BFD-0502-9FBC
http://hjhqmbxyinislkkt.19xvyd.top/BF63-AD56-7BFD-0502-9FBC
http://hjhqmbxyinislkkt.1mwvgh.top/BF63-AD56-7BFD-0502-9FBC
http://hjhqmbxyinislkkt.1fygsg.top/BF63-AD56-7BFD-0502-9FBC
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_A94FA_.hta
cerber
Targets
-
-
Target
f20519ad5ba1ffa084da05bdebb97d951651714cf4e4710f7441683301918ab8
-
Size
446KB
-
MD5
04509ce200349370e706c4e6898f67c2
-
SHA1
297a51753258c912192caaa895f47660144124be
-
SHA256
f20519ad5ba1ffa084da05bdebb97d951651714cf4e4710f7441683301918ab8
-
SHA512
3b128329c7b7cdea6aef251a7517716f4159e3ced558a9be0c1a964b8bada89f7cbc48f171147ec443b8b174f1d8db8d6892e0cb430d7428e65d5b037ef873c2
-
SSDEEP
6144:8R4GbVOUtKXVgcNX3RVR+64R8cog9kqn2KRmgWDVb/ii4mnj0De0z:GpVuSG9+VRTYgAx/Jj0z
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1