General
-
Target
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
-
Size
863KB
-
Sample
250216-qw89haynhk
-
MD5
3b04620c595f056953d8a69f7df50890
-
SHA1
a081df0cb394ef9b7d7d36e9df30a35d56d326dd
-
SHA256
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307f
-
SHA512
50be59e6d82590d47fa0eb3e95d4493b59576ec21c821ee6cf4d671687f38767e6d24b97df87c60197d014ce412a9c95c68e9938715485a88080514db4912bda
-
SSDEEP
6144:aLghm3ma0IcIIY9Y3urjY0MxecINPBPSsHo0wlTyXc4t+/qemoNNozPs:akh0marcc9RANINPB9oeMhq0
Static task
static1
Behavioral task
behavioral1
Sample
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_LIO7_.txt
http://hjhqmbxyinislkkt.onion/8800-77F8-B4E0-0501-F9B5
http://hjhqmbxyinislkkt.1cdqfv.top/8800-77F8-B4E0-0501-F9B5
http://hjhqmbxyinislkkt.13eymq.top/8800-77F8-B4E0-0501-F9B5
http://hjhqmbxyinislkkt.1eeyaj.top/8800-77F8-B4E0-0501-F9B5
http://hjhqmbxyinislkkt.1eagrj.top/8800-77F8-B4E0-0501-F9B5
http://hjhqmbxyinislkkt.1a2xx3.top/8800-77F8-B4E0-0501-F9B5
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_SF6L_.txt
http://hjhqmbxyinislkkt.onion/107B-50B1-800E-0501-F04F
http://hjhqmbxyinislkkt.1cdqfv.top/107B-50B1-800E-0501-F04F
http://hjhqmbxyinislkkt.13eymq.top/107B-50B1-800E-0501-F04F
http://hjhqmbxyinislkkt.1eeyaj.top/107B-50B1-800E-0501-F04F
http://hjhqmbxyinislkkt.1eagrj.top/107B-50B1-800E-0501-F04F
http://hjhqmbxyinislkkt.1a2xx3.top/107B-50B1-800E-0501-F04F
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_X4VWNJS_.hta
cerber
Targets
-
-
Target
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307fN.exe
-
Size
863KB
-
MD5
3b04620c595f056953d8a69f7df50890
-
SHA1
a081df0cb394ef9b7d7d36e9df30a35d56d326dd
-
SHA256
a98577b632bf0c7f52e0ad630deb142f025548e11742c722edfc1aa7e451307f
-
SHA512
50be59e6d82590d47fa0eb3e95d4493b59576ec21c821ee6cf4d671687f38767e6d24b97df87c60197d014ce412a9c95c68e9938715485a88080514db4912bda
-
SSDEEP
6144:aLghm3ma0IcIIY9Y3urjY0MxecINPBPSsHo0wlTyXc4t+/qemoNNozPs:akh0marcc9RANINPB9oeMhq0
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2