General

  • Target

    spf_2.exe

  • Size

    8.8MB

  • Sample

    250217-3kte5avkhm

  • MD5

    e388e1a1538de5b1eeba1d32a5125ef2

  • SHA1

    05040104511cd7f4cfd43b5f5a6d6fdf92be9bbc

  • SHA256

    e4ca98413958735696c6eaebd78b5d78421cc3240a6bcfc951db434d8ae01fbb

  • SHA512

    a039d24d6dfce6c25b28dd004bf99e02e082236a1597b8c6b0fcfed915535be26a8cb0b7044cc6476278af8ea9c6ff0b1568fc8466ae76550d3986994e025d41

  • SSDEEP

    196608:uUl3e6tt9MRZwWCQm2PcsZV2YXtYYsEj2rvD/:uUl3eo9MRKWCQ1PnVuwcvL

Malware Config

Targets

    • Target

      spf_2.exe

    • Size

      8.8MB

    • MD5

      e388e1a1538de5b1eeba1d32a5125ef2

    • SHA1

      05040104511cd7f4cfd43b5f5a6d6fdf92be9bbc

    • SHA256

      e4ca98413958735696c6eaebd78b5d78421cc3240a6bcfc951db434d8ae01fbb

    • SHA512

      a039d24d6dfce6c25b28dd004bf99e02e082236a1597b8c6b0fcfed915535be26a8cb0b7044cc6476278af8ea9c6ff0b1568fc8466ae76550d3986994e025d41

    • SSDEEP

      196608:uUl3e6tt9MRZwWCQm2PcsZV2YXtYYsEj2rvD/:uUl3eo9MRKWCQ1PnVuwcvL

    • Cerber

      Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

    • Cerber family

    • Downloads MZ/PE file

    • Stops running service(s)

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks