General
-
Target
4654b10b02d7a54f023c8a0c4ae22520ca1472f95e56622a84f74fb2eec3da5f.exe
-
Size
263KB
-
Sample
250121-at4cgaxkgy
-
MD5
7fb8d5a913c3939e4dbcd4a4ca951555
-
SHA1
f5976a8d232ff76078ce70771e361182f578afc0
-
SHA256
4654b10b02d7a54f023c8a0c4ae22520ca1472f95e56622a84f74fb2eec3da5f
-
SHA512
da5376f6b67ee00699c5611c70548fcf530aeafce98d7607ccfc3558277fea46ef0f5557c2d14e95259af77200385522c2d4d8088c8eaea75255b6b964948cf0
-
SSDEEP
6144:z44qB4hPmyzQ8AEvobJv4c/DWHXUnzabFerCJBhuE2n:U4+yylf/DW3UMBh3C
Static task
static1
Behavioral task
behavioral1
Sample
4654b10b02d7a54f023c8a0c4ae22520ca1472f95e56622a84f74fb2eec3da5f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4654b10b02d7a54f023c8a0c4ae22520ca1472f95e56622a84f74fb2eec3da5f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_OHC0Z2V_.txt
http://p27dokhpz2n7nvgr.onion/A59A-4D71-081D-0006-45C4
http://p27dokhpz2n7nvgr.tor2web.org/A59A-4D71-081D-0006-45C4
http://p27dokhpz2n7nvgr.onion.link/A59A-4D71-081D-0006-45C4
http://p27dokhpz2n7nvgr.onion.nu/A59A-4D71-081D-0006-45C4
http://p27dokhpz2n7nvgr.onion.cab/A59A-4D71-081D-0006-45C4
http://p27dokhpz2n7nvgr.onion.to/A59A-4D71-081D-0006-45C4
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_0BWPN_.txt
http://p27dokhpz2n7nvgr.onion/C78D-598F-98B2-0006-4E5E
http://p27dokhpz2n7nvgr.tor2web.org/C78D-598F-98B2-0006-4E5E
http://p27dokhpz2n7nvgr.onion.link/C78D-598F-98B2-0006-4E5E
http://p27dokhpz2n7nvgr.onion.nu/C78D-598F-98B2-0006-4E5E
http://p27dokhpz2n7nvgr.onion.cab/C78D-598F-98B2-0006-4E5E
http://p27dokhpz2n7nvgr.onion.to/C78D-598F-98B2-0006-4E5E
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_V6E0_.hta
cerber
Targets
-
-
Target
4654b10b02d7a54f023c8a0c4ae22520ca1472f95e56622a84f74fb2eec3da5f.exe
-
Size
263KB
-
MD5
7fb8d5a913c3939e4dbcd4a4ca951555
-
SHA1
f5976a8d232ff76078ce70771e361182f578afc0
-
SHA256
4654b10b02d7a54f023c8a0c4ae22520ca1472f95e56622a84f74fb2eec3da5f
-
SHA512
da5376f6b67ee00699c5611c70548fcf530aeafce98d7607ccfc3558277fea46ef0f5557c2d14e95259af77200385522c2d4d8088c8eaea75255b6b964948cf0
-
SSDEEP
6144:z44qB4hPmyzQ8AEvobJv4c/DWHXUnzabFerCJBhuE2n:U4+yylf/DW3UMBh3C
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1098) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2