General
-
Target
a73d7acb96ac7fa41ab009baaa19f7c0b9c818d395f24ea66734aa7406fd37fd.exe
-
Size
263KB
-
Sample
250217-fjr5ca1mgq
-
MD5
0b6b9e4676a713e7c226801b5fc87315
-
SHA1
167cf657d7b9e56ac4a43d326aa51ed8c5429fd3
-
SHA256
a73d7acb96ac7fa41ab009baaa19f7c0b9c818d395f24ea66734aa7406fd37fd
-
SHA512
2df8cec1fb9491aec3518218fc48871702f5a1f2207503f3ad9d9758fdc39729606c5b3d228cc53a813c9bceb8ff92638b6fac3787a0cf68e57f039df6c3c4f4
-
SSDEEP
6144:SAsBZoikJTvZqKan+Jjj8tjsioCKZ9JqKvryubSquKeqpMM+Ir2:ZDN7a+l8tjsioPZ2Kv2JxZqpxhr2
Static task
static1
Behavioral task
behavioral1
Sample
a73d7acb96ac7fa41ab009baaa19f7c0b9c818d395f24ea66734aa7406fd37fd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a73d7acb96ac7fa41ab009baaa19f7c0b9c818d395f24ea66734aa7406fd37fd.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
gift.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
gift.dll
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_RAQ3QLM_.txt
http://p27dokhpz2n7nvgr.onion/120C-CCC2-D140-0006-42BF
http://p27dokhpz2n7nvgr.tor2web.org/120C-CCC2-D140-0006-42BF
http://p27dokhpz2n7nvgr.onion.link/120C-CCC2-D140-0006-42BF
http://p27dokhpz2n7nvgr.onion.nu/120C-CCC2-D140-0006-42BF
http://p27dokhpz2n7nvgr.onion.cab/120C-CCC2-D140-0006-42BF
http://p27dokhpz2n7nvgr.onion.to/120C-CCC2-D140-0006-42BF
Targets
-
-
Target
a73d7acb96ac7fa41ab009baaa19f7c0b9c818d395f24ea66734aa7406fd37fd.exe
-
Size
263KB
-
MD5
0b6b9e4676a713e7c226801b5fc87315
-
SHA1
167cf657d7b9e56ac4a43d326aa51ed8c5429fd3
-
SHA256
a73d7acb96ac7fa41ab009baaa19f7c0b9c818d395f24ea66734aa7406fd37fd
-
SHA512
2df8cec1fb9491aec3518218fc48871702f5a1f2207503f3ad9d9758fdc39729606c5b3d228cc53a813c9bceb8ff92638b6fac3787a0cf68e57f039df6c3c4f4
-
SSDEEP
6144:SAsBZoikJTvZqKan+Jjj8tjsioCKZ9JqKvryubSquKeqpMM+Ir2:ZDN7a+l8tjsioPZ2Kv2JxZqpxhr2
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1098) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
b8992e497d57001ddf100f9c397fcef5
-
SHA1
e26ddf101a2ec5027975d2909306457c6f61cfbd
-
SHA256
98bcd1dd88642f4dd36a300c76ebb1ddfbbbc5bfc7e3b6d7435dc6d6e030c13b
-
SHA512
8823b1904dccfaf031068102cb1def7958a057f49ff369f0e061f1b4db2090021aa620bb8442a2a6ac9355bb74ee54371dc2599c20dc723755a46ede81533a3c
-
SSDEEP
192:PPtkumJX7zB22kGwfy0mtVgkCPOs81un:E702k5qpds8Qn
Score8/10-
Downloads MZ/PE file
-
-
-
Target
gift.dll
-
Size
63KB
-
MD5
0f24042f66d3e5d89cc6e21068f765a9
-
SHA1
8f27a5e556ab83ff5d35a58aa0e0dfd72bb78477
-
SHA256
00e8df1c5ded11cc861ce46a553cd8c66828bb2ad51241bf6cd0e0d575bb5442
-
SHA512
30464da8d18bd569fbbfaca7ce5a86eb89accd8f6c6939fc4af4ef3b67d13b57b1db6c77df213ffc19789bbbf86fac1e76c5805c191d34d06776d76217a21e7e
-
SSDEEP
768:9Y6C4+O8N1d/siAAKVhlKs9Zf6c9AJNMPWgitvP5DWOuDyuajZ+xwfgOp/KhO:eL4+LvdAznr368KNM7itvhDoA+Mp/K
Score8/10-
Downloads MZ/PE file
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2