MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eba0482a5b1232db451b1a745dd8e99defb9f1194b070e2f5c20eeb251296a86. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cerber


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: eba0482a5b1232db451b1a745dd8e99defb9f1194b070e2f5c20eeb251296a86
SHA3-384 hash: 4f5b311aef6eccc1fcf278f74b22f13542fe9710fab21a8de79ecfc337de35ff293c96cb1248859ed9faa3ee4d37559b
SHA1 hash: a42413c50f56e92ccba47f62eea44bb9542199d8
MD5 hash: df4e5c6775c14e72fa41bce9b91755f8
humanhash: michigan-september-stairway-purple
File name:eba0482a5b1232db451b1a745dd8e99defb9f1194b070e2f5c20eeb251296a86.bin
Download: download sample
Signature Cerber
File size:764'928 bytes
First seen:2022-01-08 23:11:18 UTC
Last seen:2022-01-09 00:47:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d0e6d8cc31f0d3346e66a38b8a035489 (3 x Cerber)
ssdeep 12288:84GTI/cvffub6u4iRFJmVX5h4lij0m+t+OeO+OeNhBBhhBB/quZplAcyOdvo+nwk:84y+UXquZf7Zvo+nvAYVD3
Threatray 1'219 similar samples on MalwareBazaar
TLSH T186F49D32B7D3E173D99224F04D2DA75E2839F82A0B295BE7B3D41B2E4A701D24E3165D
Reporter Arkbird_SOLG
Tags:Cerber Cerber2021 exe Ransomware

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'144
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
eba0482a5b1232db451b1a745dd8e99defb9f1194b070e2f5c20eeb251296a86.bin
Verdict:
Malicious activity
Analysis date:
2022-01-08 23:15:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Creating a file
DNS request
Changing a file
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cerber control.exe crypren filecoder greyware lockergoga ransomware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Deletes itself after installation
Found Tor onion address
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 549676 Sample: q4iQqZtEsa.bin Startdate: 09/01/2022 Architecture: WINDOWS Score: 56 22 Multi AV Scanner detection for submitted file 2->22 24 Found Tor onion address 2->24 7 q4iQqZtEsa.exe 6 2->7         started        process3 signatures4 26 Deletes itself after installation 7->26 10 cmd.exe 1 7->10         started        12 cmd.exe 1 7->12         started        14 conhost.exe 7->14         started        process5 process6 16 conhost.exe 10->16         started        18 choice.exe 1 10->18         started        20 conhost.exe 12->20         started       
Threat name:
Win32.Ransomware.LockerGoga
Status:
Malicious
First seen:
2021-12-05 06:40:06 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
30 of 43 (69.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
ransomware spyware stealer
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Deletes itself
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
6c1fba846151c1f61084977d1660e68e76157e7a50d89b5ffd9ddc1ca3eea9db
MD5 hash:
8a0c49216f7841aecd1d9795b6069527
SHA1 hash:
e61f672e88592ec224b22eddc76b00b1ddc50fa7
SH256 hash:
ecfa7a56bb748fe3e20ed8f04f0da492532c5d37f7ef4f741cafe6194ddd86d0
MD5 hash:
2a025f058eac425b6c31c42801ce3d2b
SHA1 hash:
b04edd2e0572f14b6059463c89daa0165b24930d
SH256 hash:
07849d62614790f23edb8cfd90e4f4c93032a037768bca482df0780d1a62300c
MD5 hash:
d87b2f172a68cdb7404ea1afbd36772a
SHA1 hash:
53114151aa784b87e15091bce4d93cc6935c3378
SH256 hash:
2118cb740766023eee92f83b9ea355c9717994b1502d515742f3ca1ecc56b5e4
MD5 hash:
9c7cda3bc19f5fa1efa714aeb24d5090
SHA1 hash:
31095816c32bd5dcdcb6f6fb57a56cb3ee3b2b07
SH256 hash:
eba0482a5b1232db451b1a745dd8e99defb9f1194b070e2f5c20eeb251296a86
MD5 hash:
df4e5c6775c14e72fa41bce9b91755f8
SHA1 hash:
a42413c50f56e92ccba47f62eea44bb9542199d8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments