General
-
Target
5c6af4f75f939b8be2cf60ea5c7ee3966f6c875c1ac3d0bf239533a89a70ba5f
-
Size
480KB
-
Sample
250311-3w7rwszjt7
-
MD5
e60386eb1697dc0ff9cbd632d35bd3ee
-
SHA1
1e28b366ad253c49a9e7f8ec377ddb7e3a6385e4
-
SHA256
5c6af4f75f939b8be2cf60ea5c7ee3966f6c875c1ac3d0bf239533a89a70ba5f
-
SHA512
0ba6252ece53afb051ce1e6cdeedd3a17e8cf6fd5db5b3c4ad75e1d85e7d4bce2851b4640cb1dd74800362a6d9d8fb41baeb157e0e48ebd853e1e80c30e74638
-
SSDEEP
12288:ono6RLXo5oM7Z1LCMpMiZ3kLgED3UjKpK:onK5oGuMpd0sED
Static task
static1
Behavioral task
behavioral1
Sample
5c6af4f75f939b8be2cf60ea5c7ee3966f6c875c1ac3d0bf239533a89a70ba5f.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
5c6af4f75f939b8be2cf60ea5c7ee3966f6c875c1ac3d0bf239533a89a70ba5f.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_SSWX_.txt
http://hjhqmbxyinislkkt.onion/4D11-6C4E-339C-05C4-22B5
http://hjhqmbxyinislkkt.19xvyd.top/4D11-6C4E-339C-05C4-22B5
http://hjhqmbxyinislkkt.1mwvgh.top/4D11-6C4E-339C-05C4-22B5
http://hjhqmbxyinislkkt.1fygsg.top/4D11-6C4E-339C-05C4-22B5
http://hjhqmbxyinislkkt.1j43kf.top/4D11-6C4E-339C-05C4-22B5
http://hjhqmbxyinislkkt.1fnjrj.top/4D11-6C4E-339C-05C4-22B5
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_TGSRHY_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_EOGW_.txt
http://hjhqmbxyinislkkt.onion/FA00-221B-BF1B-05C4-226E
http://hjhqmbxyinislkkt.19xvyd.top/FA00-221B-BF1B-05C4-226E
http://hjhqmbxyinislkkt.1mwvgh.top/FA00-221B-BF1B-05C4-226E
http://hjhqmbxyinislkkt.1fygsg.top/FA00-221B-BF1B-05C4-226E
http://hjhqmbxyinislkkt.1j43kf.top/FA00-221B-BF1B-05C4-226E
http://hjhqmbxyinislkkt.1fnjrj.top/FA00-221B-BF1B-05C4-226E
Targets
-
-
Target
5c6af4f75f939b8be2cf60ea5c7ee3966f6c875c1ac3d0bf239533a89a70ba5f
-
Size
480KB
-
MD5
e60386eb1697dc0ff9cbd632d35bd3ee
-
SHA1
1e28b366ad253c49a9e7f8ec377ddb7e3a6385e4
-
SHA256
5c6af4f75f939b8be2cf60ea5c7ee3966f6c875c1ac3d0bf239533a89a70ba5f
-
SHA512
0ba6252ece53afb051ce1e6cdeedd3a17e8cf6fd5db5b3c4ad75e1d85e7d4bce2851b4640cb1dd74800362a6d9d8fb41baeb157e0e48ebd853e1e80c30e74638
-
SSDEEP
12288:ono6RLXo5oM7Z1LCMpMiZ3kLgED3UjKpK:onK5oGuMpd0sED
-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (1090) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1