General
-
Target
2025-02-07_10188103ecbc13790580621c371e4c7b_spora
-
Size
253KB
-
Sample
250207-xd3gkatpbp
-
MD5
10188103ecbc13790580621c371e4c7b
-
SHA1
86d11b19ce9662df85d197e8bef36860f665d491
-
SHA256
f0c7cb124cfcb9bcb74980b7197fde014efa442974db4d520e2f66c25c371471
-
SHA512
a3608f07f26a680baa430969389f97a23a50626dd831daf5cacc577b8cc67029290e45b4afd172de350165b8ab713393b281ab8a9402bfc676f27edfdaeb6ed0
-
SSDEEP
6144:YZpsZjPwS/DuL8f8aUChN9lCKF6r2Ufz/:DjPlRf8aUm6rFfb
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_10188103ecbc13790580621c371e4c7b_spora.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-07_10188103ecbc13790580621c371e4c7b_spora.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_J43ZO_.txt
http://hjhqmbxyinislkkt.onion/825F-FE4D-B490-0502-2F0E
http://hjhqmbxyinislkkt.1gu5um.top/825F-FE4D-B490-0502-2F0E
http://hjhqmbxyinislkkt.1w5iy8.top/825F-FE4D-B490-0502-2F0E
http://hjhqmbxyinislkkt.1aajb7.top/825F-FE4D-B490-0502-2F0E
http://hjhqmbxyinislkkt.1nm62r.top/825F-FE4D-B490-0502-2F0E
http://hjhqmbxyinislkkt.1efxa8.top/825F-FE4D-B490-0502-2F0E
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_5CR25_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_BTAB62O_.txt
http://hjhqmbxyinislkkt.onion/6BC6-CBFB-3571-0502-2C6A
http://hjhqmbxyinislkkt.1gu5um.top/6BC6-CBFB-3571-0502-2C6A
http://hjhqmbxyinislkkt.1w5iy8.top/6BC6-CBFB-3571-0502-2C6A
http://hjhqmbxyinislkkt.1aajb7.top/6BC6-CBFB-3571-0502-2C6A
http://hjhqmbxyinislkkt.1nm62r.top/6BC6-CBFB-3571-0502-2C6A
http://hjhqmbxyinislkkt.1efxa8.top/6BC6-CBFB-3571-0502-2C6A
Targets
-
-
Target
2025-02-07_10188103ecbc13790580621c371e4c7b_spora
-
Size
253KB
-
MD5
10188103ecbc13790580621c371e4c7b
-
SHA1
86d11b19ce9662df85d197e8bef36860f665d491
-
SHA256
f0c7cb124cfcb9bcb74980b7197fde014efa442974db4d520e2f66c25c371471
-
SHA512
a3608f07f26a680baa430969389f97a23a50626dd831daf5cacc577b8cc67029290e45b4afd172de350165b8ab713393b281ab8a9402bfc676f27edfdaeb6ed0
-
SSDEEP
6144:YZpsZjPwS/DuL8f8aUChN9lCKF6r2Ufz/:DjPlRf8aUm6rFfb
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2