General
-
Target
http://free spoofer fornite
-
Sample
250120-xtg6katpgp
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://free spoofer fornite
Resource
win10v2004-20241007-en
windows10-2004-x64
36 signatures
900 seconds
Malware Config
Targets
-
-
Target
http://free spoofer fornite
-
Cerber family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
5System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1