General
-
Target
69c25409639131445b74146349726dcddce23b79d3cd6ed9d98f08bc6626b27c
-
Size
280KB
-
Sample
250221-b5qfeszjhz
-
MD5
f04272e1893caff78c0bc335286bdfc9
-
SHA1
722215edc89870bb0c33e65908391bf87a7f93f8
-
SHA256
69c25409639131445b74146349726dcddce23b79d3cd6ed9d98f08bc6626b27c
-
SHA512
24581bab9d44afb150f01648db8e4e95d3359aa1e720d790a11e50e8a475b505c3d05c683b79cb25b3242b83ec1d103fed095af530c0f15fc8e783d732f0e99a
-
SSDEEP
6144:APfe/V3WApRICD4pz+ZoIQB9SkZsBt1QbVHyf:AHQVlRIoZMB9SkJVC
Static task
static1
Behavioral task
behavioral1
Sample
69c25409639131445b74146349726dcddce23b79d3cd6ed9d98f08bc6626b27c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69c25409639131445b74146349726dcddce23b79d3cd6ed9d98f08bc6626b27c.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_YW8V2_.txt
http://hjhqmbxyinislkkt.onion/EFA7-D4E6-30C2-05C4-02F6
http://hjhqmbxyinislkkt.1gu5um.top/EFA7-D4E6-30C2-05C4-02F6
http://hjhqmbxyinislkkt.1w5iy8.top/EFA7-D4E6-30C2-05C4-02F6
http://hjhqmbxyinislkkt.1aajb7.top/EFA7-D4E6-30C2-05C4-02F6
http://hjhqmbxyinislkkt.1nm62r.top/EFA7-D4E6-30C2-05C4-02F6
http://hjhqmbxyinislkkt.1efxa8.top/EFA7-D4E6-30C2-05C4-02F6
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_C2Z1P1_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_AZHEI_.txt
http://hjhqmbxyinislkkt.onion/A4F4-6002-FB6E-05C4-09FD
http://hjhqmbxyinislkkt.1gu5um.top/A4F4-6002-FB6E-05C4-09FD
http://hjhqmbxyinislkkt.1w5iy8.top/A4F4-6002-FB6E-05C4-09FD
http://hjhqmbxyinislkkt.1aajb7.top/A4F4-6002-FB6E-05C4-09FD
http://hjhqmbxyinislkkt.1nm62r.top/A4F4-6002-FB6E-05C4-09FD
http://hjhqmbxyinislkkt.1efxa8.top/A4F4-6002-FB6E-05C4-09FD
Targets
-
-
Target
69c25409639131445b74146349726dcddce23b79d3cd6ed9d98f08bc6626b27c
-
Size
280KB
-
MD5
f04272e1893caff78c0bc335286bdfc9
-
SHA1
722215edc89870bb0c33e65908391bf87a7f93f8
-
SHA256
69c25409639131445b74146349726dcddce23b79d3cd6ed9d98f08bc6626b27c
-
SHA512
24581bab9d44afb150f01648db8e4e95d3359aa1e720d790a11e50e8a475b505c3d05c683b79cb25b3242b83ec1d103fed095af530c0f15fc8e783d732f0e99a
-
SSDEEP
6144:APfe/V3WApRICD4pz+ZoIQB9SkZsBt1QbVHyf:AHQVlRIoZMB9SkJVC
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2