General
-
Target
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd
-
Size
248KB
-
Sample
250215-hrtn9awrey
-
MD5
46d0b73129531db5d366e919885cff04
-
SHA1
93570d04e57a410374085dd495f99a550451e8c2
-
SHA256
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd
-
SHA512
1b5c21964bf693d04d07bb1f960e7ac9ffd4361d571c1292e2cbc7a653092168378771c09f06ec01a9b3582d14cdd22009004eaef41fecafadfbe277ff3a9daa
-
SSDEEP
3072:Y6sRpXsj2DDca5Tg2/clFaJhyJgrZbONQhVVUvUgqa4r6yqGOCtC9dnBtTXWGwqb:Y6sRp8K8eg2UlE70QZUvUGKIZZtIqb
Static task
static1
Behavioral task
behavioral1
Sample
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_AZZ3OS_.txt
http://hjhqmbxyinislkkt.onion/8F0F-2438-0063-05C4-0680
http://hjhqmbxyinislkkt.1eeyaj.top/8F0F-2438-0063-05C4-0680
http://hjhqmbxyinislkkt.1eagrj.top/8F0F-2438-0063-05C4-0680
http://hjhqmbxyinislkkt.1a2xx3.top/8F0F-2438-0063-05C4-0680
http://hjhqmbxyinislkkt.1gu5um.top/8F0F-2438-0063-05C4-0680
http://hjhqmbxyinislkkt.1w5iy8.top/8F0F-2438-0063-05C4-0680
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_EWM1MUNS_.txt
http://hjhqmbxyinislkkt.onion/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1eeyaj.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1eagrj.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1a2xx3.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1gu5um.top/03B2-992C-5C6B-05C4-049E
http://hjhqmbxyinislkkt.1w5iy8.top/03B2-992C-5C6B-05C4-049E
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_2V4B_.hta
cerber
Targets
-
-
Target
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd
-
Size
248KB
-
MD5
46d0b73129531db5d366e919885cff04
-
SHA1
93570d04e57a410374085dd495f99a550451e8c2
-
SHA256
d98f66327f7b4548abc2a452a154175cc7df0baf64c37d1d546ad9dc8d10d7fd
-
SHA512
1b5c21964bf693d04d07bb1f960e7ac9ffd4361d571c1292e2cbc7a653092168378771c09f06ec01a9b3582d14cdd22009004eaef41fecafadfbe277ff3a9daa
-
SSDEEP
3072:Y6sRpXsj2DDca5Tg2/clFaJhyJgrZbONQhVVUvUgqa4r6yqGOCtC9dnBtTXWGwqb:Y6sRp8K8eg2UlE70QZUvUGKIZZtIqb
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2