General
-
Target
spam.ps1
-
Size
751B
-
Sample
250214-1wth6aznew
-
MD5
8b0e2d190f955bf1704000f1ff0e728c
-
SHA1
d22e5aeaedf9b18f237cf1ad475c522478aad47a
-
SHA256
d01912af7edc66bb1e9f135ae5e4804f8e4b09713239c07850c987d7a1362906
-
SHA512
a0802f01e3670b1b5003dc1dc2bde8059fff200cc1090919bf54dab2b6eebba4a717b68aee21f4b8d3034707333cd0a0a86d0ba01d477321954d253f26ca5e03
Static task
static1
Behavioral task
behavioral1
Sample
spam.ps1
Resource
win11-20250210-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___8KSUH4PG_.txt
cerber
http://xpcx6erilkjced3j.onion/A277-1178-4133-0098-BEFC
http://xpcx6erilkjced3j.1n5mod.top/A277-1178-4133-0098-BEFC
http://xpcx6erilkjced3j.19kdeh.top/A277-1178-4133-0098-BEFC
http://xpcx6erilkjced3j.1mpsnr.top/A277-1178-4133-0098-BEFC
http://xpcx6erilkjced3j.18ey8e.top/A277-1178-4133-0098-BEFC
http://xpcx6erilkjced3j.17gcun.top/A277-1178-4133-0098-BEFC
Targets
-
-
Target
spam.ps1
-
Size
751B
-
MD5
8b0e2d190f955bf1704000f1ff0e728c
-
SHA1
d22e5aeaedf9b18f237cf1ad475c522478aad47a
-
SHA256
d01912af7edc66bb1e9f135ae5e4804f8e4b09713239c07850c987d7a1362906
-
SHA512
a0802f01e3670b1b5003dc1dc2bde8059fff200cc1090919bf54dab2b6eebba4a717b68aee21f4b8d3034707333cd0a0a86d0ba01d477321954d253f26ca5e03
-
Cerber family
-
Modifies WinLogon for persistence
-
UAC bypass
-
Contacts a large (1124) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1