General
-
Target
FreeSpoofer.exe
-
Size
3.6MB
-
Sample
250203-rzckdavrfm
-
MD5
d8caeb46f4e99d53b24a27bc62e06551
-
SHA1
6aa211685157b0a76435da5e40dd1c95c018e913
-
SHA256
871ec8bf2237716e219a648c32f24cf8ad584a0f929076aa68dba0abe147b861
-
SHA512
9b9797919fb26fd4a97a20c18a5292015ce3512211c5666487a09d5ab70ae6680be4d1e570bbc95bc47341675a51dad2fd9797be5d4d337421f40ab6fefad3bf
-
SSDEEP
49152:7yWRDINFfPPHf/2sKVJOZqybgQccCRar1TVejyhTmhOoA6DCHoFIx71DuGLt:mWRQf/+ebgQccSaRuE76NKBDuG
Behavioral task
behavioral1
Sample
FreeSpoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FreeSpoofer.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
FreeSpoofer.exe
-
Size
3.6MB
-
MD5
d8caeb46f4e99d53b24a27bc62e06551
-
SHA1
6aa211685157b0a76435da5e40dd1c95c018e913
-
SHA256
871ec8bf2237716e219a648c32f24cf8ad584a0f929076aa68dba0abe147b861
-
SHA512
9b9797919fb26fd4a97a20c18a5292015ce3512211c5666487a09d5ab70ae6680be4d1e570bbc95bc47341675a51dad2fd9797be5d4d337421f40ab6fefad3bf
-
SSDEEP
49152:7yWRDINFfPPHf/2sKVJOZqybgQccCRar1TVejyhTmhOoA6DCHoFIx71DuGLt:mWRQf/+ebgQccSaRuE76NKBDuG
-
Cerber family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1