General
-
Target
8b987e88fd0534c5b3f288e1e0027d53aedf2df6973f10b30747d7d2635191f2
-
Size
353KB
-
Sample
250322-yyszastmz6
-
MD5
ed026b2a4127b2ab2c2096572ce0545b
-
SHA1
61dc7df9cfacc469b6a2ad545e1775570927ba30
-
SHA256
8b987e88fd0534c5b3f288e1e0027d53aedf2df6973f10b30747d7d2635191f2
-
SHA512
2cba9d9286efd1eabe7b7a2510f2cec9c94841f2ce09f87a6c02b8ab0983dc5925d63f3afd961aad04ed39fb189bea92f2d433b410d1cade56b2af050df172b0
-
SSDEEP
6144:k3FsH8UeJNmbYj1FOQ+sJjwI5Mg8QC1N1fdiU:iFMeXm+vtjwcMgilL
Static task
static1
Behavioral task
behavioral1
Sample
8b987e88fd0534c5b3f288e1e0027d53aedf2df6973f10b30747d7d2635191f2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8b987e88fd0534c5b3f288e1e0027d53aedf2df6973f10b30747d7d2635191f2.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\README.hta
Extracted
C:\Users\Admin\Music\README.hta
Targets
-
-
Target
8b987e88fd0534c5b3f288e1e0027d53aedf2df6973f10b30747d7d2635191f2
-
Size
353KB
-
MD5
ed026b2a4127b2ab2c2096572ce0545b
-
SHA1
61dc7df9cfacc469b6a2ad545e1775570927ba30
-
SHA256
8b987e88fd0534c5b3f288e1e0027d53aedf2df6973f10b30747d7d2635191f2
-
SHA512
2cba9d9286efd1eabe7b7a2510f2cec9c94841f2ce09f87a6c02b8ab0983dc5925d63f3afd961aad04ed39fb189bea92f2d433b410d1cade56b2af050df172b0
-
SSDEEP
6144:k3FsH8UeJNmbYj1FOQ+sJjwI5Mg8QC1N1fdiU:iFMeXm+vtjwcMgilL
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (520) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1