General
-
Target
2025-02-03_010b6dde15074e36899e0f993d9fa95f_spora
-
Size
257KB
-
Sample
250203-wamfhazlgq
-
MD5
010b6dde15074e36899e0f993d9fa95f
-
SHA1
3af04c3ecfa3a0f169bdd55db8dddb4306c7f3d7
-
SHA256
2a5d33e724d715d97068198a65e20d1a6967ca2f5293711f5f23187501685fbd
-
SHA512
bc7e24026689901b42ae478831ce4bde9520fa7b453034fe882fc30e53101a624a0cfe68f779196dc299e433eed46e160a2e1c60e7bd742e80abf01b0cd0e21d
-
SSDEEP
6144:Zw5s4w5sIMsZwtI9K72UIETOhiJq2EKKbOEWVZ9UuCUrbJ+RX6:a5sd5sIM/Xm0g2Erju9UgrbME
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_010b6dde15074e36899e0f993d9fa95f_spora.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-02-03_010b6dde15074e36899e0f993d9fa95f_spora.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_2369EYF_.txt
http://hjhqmbxyinislkkt.onion/F9AC-7056-8573-0093-C198
http://hjhqmbxyinislkkt.1cdqfv.top/F9AC-7056-8573-0093-C198
http://hjhqmbxyinislkkt.13eymq.top/F9AC-7056-8573-0093-C198
http://hjhqmbxyinislkkt.1eeyaj.top/F9AC-7056-8573-0093-C198
http://hjhqmbxyinislkkt.1eagrj.top/F9AC-7056-8573-0093-C198
http://hjhqmbxyinislkkt.1a2xx3.top/F9AC-7056-8573-0093-C198
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_8PWO7GJQ_.hta
cerber
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_2OH9C_.txt
http://hjhqmbxyinislkkt.onion/695C-EF17-DCA1-0093-C509
http://hjhqmbxyinislkkt.1cdqfv.top/695C-EF17-DCA1-0093-C509
http://hjhqmbxyinislkkt.13eymq.top/695C-EF17-DCA1-0093-C509
http://hjhqmbxyinislkkt.1eeyaj.top/695C-EF17-DCA1-0093-C509
http://hjhqmbxyinislkkt.1eagrj.top/695C-EF17-DCA1-0093-C509
http://hjhqmbxyinislkkt.1a2xx3.top/695C-EF17-DCA1-0093-C509
Targets
-
-
Target
2025-02-03_010b6dde15074e36899e0f993d9fa95f_spora
-
Size
257KB
-
MD5
010b6dde15074e36899e0f993d9fa95f
-
SHA1
3af04c3ecfa3a0f169bdd55db8dddb4306c7f3d7
-
SHA256
2a5d33e724d715d97068198a65e20d1a6967ca2f5293711f5f23187501685fbd
-
SHA512
bc7e24026689901b42ae478831ce4bde9520fa7b453034fe882fc30e53101a624a0cfe68f779196dc299e433eed46e160a2e1c60e7bd742e80abf01b0cd0e21d
-
SSDEEP
6144:Zw5s4w5sIMsZwtI9K72UIETOhiJq2EKKbOEWVZ9UuCUrbJ+RX6:a5sd5sIM/Xm0g2Erju9UgrbME
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2