General
-
Target
6c9a70865b976095a5d7c09b8b80c2191b8f2727aa7cda09715ea5beb242cd69.exe
-
Size
284KB
-
Sample
250216-kd9jnazqgv
-
MD5
cbd6b660f253d9335a12c014341d9bf0
-
SHA1
9cef6488c6a87f85ecf3b6816e2bc7dc9f9dee44
-
SHA256
6c9a70865b976095a5d7c09b8b80c2191b8f2727aa7cda09715ea5beb242cd69
-
SHA512
1417ec75f6cbb13873a2391027866b36319d89ecd3e3169ee4c528fc0178bc5ddbf24d7be91f0ec5c8b03d7c6a208eb73c200417422a7d59f7e98646e20676d3
-
SSDEEP
3072:ItkANW4LGu3XL7qPnVDvLlsBOo9usQZ6lI2TwSBnW94/6NekcsH8ZlW90NIx0Bbc:IxW4KuncVuB9usQZWMcscoiIgUHsSueX
Static task
static1
Behavioral task
behavioral1
Sample
6c9a70865b976095a5d7c09b8b80c2191b8f2727aa7cda09715ea5beb242cd69.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c9a70865b976095a5d7c09b8b80c2191b8f2727aa7cda09715ea5beb242cd69.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_H8T27R_.txt
http://p27dokhpz2n7nvgr.onion/EC89-C6EE-83BB-0006-4740
http://p27dokhpz2n7nvgr.tor2web.org/EC89-C6EE-83BB-0006-4740
http://p27dokhpz2n7nvgr.onion.link/EC89-C6EE-83BB-0006-4740
http://p27dokhpz2n7nvgr.onion.nu/EC89-C6EE-83BB-0006-4740
http://p27dokhpz2n7nvgr.onion.cab/EC89-C6EE-83BB-0006-4740
http://p27dokhpz2n7nvgr.onion.to/EC89-C6EE-83BB-0006-4740
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_VAU3FC_.txt
http://p27dokhpz2n7nvgr.onion/ED40-A6A9-8940-0006-4826
http://p27dokhpz2n7nvgr.tor2web.org/ED40-A6A9-8940-0006-4826
http://p27dokhpz2n7nvgr.onion.link/ED40-A6A9-8940-0006-4826
http://p27dokhpz2n7nvgr.onion.nu/ED40-A6A9-8940-0006-4826
http://p27dokhpz2n7nvgr.onion.cab/ED40-A6A9-8940-0006-4826
http://p27dokhpz2n7nvgr.onion.to/ED40-A6A9-8940-0006-4826
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_ZMYY6KO_.hta
cerber
Targets
-
-
Target
6c9a70865b976095a5d7c09b8b80c2191b8f2727aa7cda09715ea5beb242cd69.exe
-
Size
284KB
-
MD5
cbd6b660f253d9335a12c014341d9bf0
-
SHA1
9cef6488c6a87f85ecf3b6816e2bc7dc9f9dee44
-
SHA256
6c9a70865b976095a5d7c09b8b80c2191b8f2727aa7cda09715ea5beb242cd69
-
SHA512
1417ec75f6cbb13873a2391027866b36319d89ecd3e3169ee4c528fc0178bc5ddbf24d7be91f0ec5c8b03d7c6a208eb73c200417422a7d59f7e98646e20676d3
-
SSDEEP
3072:ItkANW4LGu3XL7qPnVDvLlsBOo9usQZ6lI2TwSBnW94/6NekcsH8ZlW90NIx0Bbc:IxW4KuncVuB9usQZWMcscoiIgUHsSueX
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1096) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1