General
-
Target
c28e77b154384b98e67384b0a5e1ac821e0741761affe88299b329895947362dN.exe
-
Size
262KB
-
Sample
250216-jstajszkdv
-
MD5
1eacbc706d48f602eef6b5a364149bc0
-
SHA1
21da3bcd11076232ace66e4586d2ae9b810aae1d
-
SHA256
c28e77b154384b98e67384b0a5e1ac821e0741761affe88299b329895947362d
-
SHA512
33ce7cd483e26fe9e1729a6be90f5818304742420087b9a94d273779f4e5871a77f77ecd6a365ac3032e690ca303c6eb0b63eacfec1733324a67eabc65bbc159
-
SSDEEP
6144:SAsBZoikJTvZqKan+Jjj8tjsioCKZ9JqKvryubSquKeqpMM+Ir2:ZDN7a+l8tjsioPZ2Kv2JxZqpxhr2
Static task
static1
Behavioral task
behavioral1
Sample
c28e77b154384b98e67384b0a5e1ac821e0741761affe88299b329895947362dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c28e77b154384b98e67384b0a5e1ac821e0741761affe88299b329895947362dN.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
gift.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
gift.dll
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_PSYUOP_.txt
http://hjhqmbxyinislkkt.onion/CBAB-0728-8FDE-05C4-2B46
http://hjhqmbxyinislkkt.1gu5um.top/CBAB-0728-8FDE-05C4-2B46
http://hjhqmbxyinislkkt.1w5iy8.top/CBAB-0728-8FDE-05C4-2B46
http://hjhqmbxyinislkkt.1aajb7.top/CBAB-0728-8FDE-05C4-2B46
http://hjhqmbxyinislkkt.1nm62r.top/CBAB-0728-8FDE-05C4-2B46
http://hjhqmbxyinislkkt.1efxa8.top/CBAB-0728-8FDE-05C4-2B46
Targets
-
-
Target
c28e77b154384b98e67384b0a5e1ac821e0741761affe88299b329895947362dN.exe
-
Size
262KB
-
MD5
1eacbc706d48f602eef6b5a364149bc0
-
SHA1
21da3bcd11076232ace66e4586d2ae9b810aae1d
-
SHA256
c28e77b154384b98e67384b0a5e1ac821e0741761affe88299b329895947362d
-
SHA512
33ce7cd483e26fe9e1729a6be90f5818304742420087b9a94d273779f4e5871a77f77ecd6a365ac3032e690ca303c6eb0b63eacfec1733324a67eabc65bbc159
-
SSDEEP
6144:SAsBZoikJTvZqKan+Jjj8tjsioCKZ9JqKvryubSquKeqpMM+Ir2:ZDN7a+l8tjsioPZ2Kv2JxZqpxhr2
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
b8992e497d57001ddf100f9c397fcef5
-
SHA1
e26ddf101a2ec5027975d2909306457c6f61cfbd
-
SHA256
98bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
-
SHA512
8823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c
-
SSDEEP
192:PPtkumJX7zB22kGwfy0mtVgkCPOs81un:E702k5qpds8Qn
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
gift.dll
-
Size
63KB
-
MD5
0f24042f66d3e5d89cc6e21068f765a9
-
SHA1
8f27a5e556ab83ff5d35a58aa0e0dfd72bb78477
-
SHA256
00e8df1c5ded11cc861ce46a553cd8c66828bb2ad51241bf6cd0e0d575bb5442
-
SHA512
30464da8d18bd569fbbfaca7ce5a86eb89accd8f6c6939fc4af4ef3b67d13b57b1db6c77df213ffc19789bbbf86fac1e76c5805c191d34d06776d76217a21e7e
-
SSDEEP
768:9Y6C4+O8N1d/siAAKVhlKs9Zf6c9AJNMPWgitvP5DWOuDyuajZ+xwfgOp/KhO:eL4+LvdAznr368KNM7itvhDoA+Mp/K
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5