General
-
Target
2c801a5abec5ffa9a0b288d695f7ed6f835f0cb261d12a7b364a5c577333c424N.exe
-
Size
284KB
-
Sample
250217-jc596svrav
-
MD5
3dcc801de24dfea081a65cbb852ed9a0
-
SHA1
2e382c9ab27f066985939d9b4877378f8b534f15
-
SHA256
2c801a5abec5ffa9a0b288d695f7ed6f835f0cb261d12a7b364a5c577333c424
-
SHA512
23caebdafc6e867ab5074a880c089dc1c35a2d8fb0a2543926c4bb3af0845ae02aeee9f1d1293f6d6b2710464691082d3afeec4a264926033b17c94f179edf72
-
SSDEEP
3072:ItkANW4LGu3XL7qPnVDvLlsBOo9usQZ6lI2TwSBnW94/6NekcsH8ZlW90NIx0BbE:IxW4KuncVuB9usQZWMcscoiIgUHsSueV
Static task
static1
Behavioral task
behavioral1
Sample
2c801a5abec5ffa9a0b288d695f7ed6f835f0cb261d12a7b364a5c577333c424N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c801a5abec5ffa9a0b288d695f7ed6f835f0cb261d12a7b364a5c577333c424N.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_6X1AW_.txt
http://hjhqmbxyinislkkt.onion/41C4-E425-930D-05C3-E0EA
http://hjhqmbxyinislkkt.1c1ajf.top/41C4-E425-930D-05C3-E0EA
http://hjhqmbxyinislkkt.1mee2x.top/41C4-E425-930D-05C3-E0EA
http://hjhqmbxyinislkkt.19hj4f.top/41C4-E425-930D-05C3-E0EA
http://hjhqmbxyinislkkt.12bxp9.top/41C4-E425-930D-05C3-E0EA
http://hjhqmbxyinislkkt.12zucf.top/41C4-E425-930D-05C3-E0EA
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_H6M7RTDW_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_FEGHZ_.txt
http://hjhqmbxyinislkkt.onion/2963-473E-1DB5-05C3-E4ED
http://hjhqmbxyinislkkt.1c1ajf.top/2963-473E-1DB5-05C3-E4ED
http://hjhqmbxyinislkkt.1mee2x.top/2963-473E-1DB5-05C3-E4ED
http://hjhqmbxyinislkkt.19hj4f.top/2963-473E-1DB5-05C3-E4ED
http://hjhqmbxyinislkkt.12bxp9.top/2963-473E-1DB5-05C3-E4ED
http://hjhqmbxyinislkkt.12zucf.top/2963-473E-1DB5-05C3-E4ED
Targets
-
-
Target
2c801a5abec5ffa9a0b288d695f7ed6f835f0cb261d12a7b364a5c577333c424N.exe
-
Size
284KB
-
MD5
3dcc801de24dfea081a65cbb852ed9a0
-
SHA1
2e382c9ab27f066985939d9b4877378f8b534f15
-
SHA256
2c801a5abec5ffa9a0b288d695f7ed6f835f0cb261d12a7b364a5c577333c424
-
SHA512
23caebdafc6e867ab5074a880c089dc1c35a2d8fb0a2543926c4bb3af0845ae02aeee9f1d1293f6d6b2710464691082d3afeec4a264926033b17c94f179edf72
-
SSDEEP
3072:ItkANW4LGu3XL7qPnVDvLlsBOo9usQZ6lI2TwSBnW94/6NekcsH8ZlW90NIx0BbE:IxW4KuncVuB9usQZWMcscoiIgUHsSueV
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1