General
-
Target
2025-02-12_9eb93d227e97e15d453d357da5cc6e59_cerber
-
Size
413KB
-
Sample
250212-tetz2ayldw
-
MD5
9eb93d227e97e15d453d357da5cc6e59
-
SHA1
aefd27e5f62555a1ccb3c69fdb21067d3ffcd500
-
SHA256
8e7e587de1cf05bfc2d42695483f7443e2ab4be6c5386a01cbed878423284578
-
SHA512
6ad5739dc9b134570f21e5ac1bcd0614f74f3de95cd5e1d7923d67514590debaef28ca1c7dc4a8e6c54e46e6b9903993427f7a2194d20eb969c54dde930063f8
-
SSDEEP
6144:s5W8AUzdkbdtYkrKEdSIYQiRCBcdXlc3uC3Zw81/X4:s5eUzdkDHmLcx3t/X4
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-12_9eb93d227e97e15d453d357da5cc6e59_cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-12_9eb93d227e97e15d453d357da5cc6e59_cerber.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\README.hta
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\README.hta
Targets
-
-
Target
2025-02-12_9eb93d227e97e15d453d357da5cc6e59_cerber
-
Size
413KB
-
MD5
9eb93d227e97e15d453d357da5cc6e59
-
SHA1
aefd27e5f62555a1ccb3c69fdb21067d3ffcd500
-
SHA256
8e7e587de1cf05bfc2d42695483f7443e2ab4be6c5386a01cbed878423284578
-
SHA512
6ad5739dc9b134570f21e5ac1bcd0614f74f3de95cd5e1d7923d67514590debaef28ca1c7dc4a8e6c54e46e6b9903993427f7a2194d20eb969c54dde930063f8
-
SSDEEP
6144:s5W8AUzdkbdtYkrKEdSIYQiRCBcdXlc3uC3Zw81/X4:s5eUzdkDHmLcx3t/X4
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (1094) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1