Cerber ransomware analysis

Aliases: Win32/Filecoder.Cerber.B (ESET-NOD32); Ransom.Cerber (Malwarebytes); Ransom:Win32/Cerber (Microsoft); Win-Trojan/Cerber.Gen (AhnLab-V3); RANSOM_CERBER(Trend Micro)

Overview

Cerber is one of the most widely spread ransomware families, consisting of many different variants, most of them still active to date. Its damage capabilities are extensive, targeting files and databases, and its reach is wide, as this family is part of the most important ransomware-as-a-service platforms.

This Cerber ransomware analysis is based on a representative, specific ransomware variant (having the hash value specified in the corresponding section below). There are other variants that behave similarly, but the details may differ to various extents.

The ransomware spreads via email with a javascript attachment. When executed, the script connects to the internet and downloads the payload that performs the actual encryption process. The payload attacks the files and changes the desktop picture to a ransom note. It creates a ransom note in every folder successfully attacked.

Email attachment

Type: zip
Archive content: Java script (.js extension)
Hash of java script: 5cfc3401a4afe037fc5d43e1ca801d44152509bfb3ba6ca5d0ad32cab73e75f8 – Virustotal report
Payload download URL: h..p://www.caloploerd.top/admin.php?f=1

Attachment actions

  • Upon execution, the javascript connects to a server and downloads the payload
  • Reads the cryptographic machine data from the registry
  • Reads user identification data from the registry
  • Opens cmd and launches the downloaded payload

Network communications – HTTP headers


HTTP headers

Successful payload download


Successful payload download (cached):

Registry changes to Internet Explorer settings


Registry changes to Internet Explorer settings

Modified desktop background


Modified desktop image

Payload details

File name: mtr98ho8c.exe;

File size: 603 KB;

Hash: 24D829C336777A0DAC903D3860B694984C0CC88DCCB85CA56B128647F156F510.

Actions

  1. Reads network and environment data, cryptography data, user’s data, computer’s data etc. for identification purposes;
  2. Connects to several external servers on UDP port 6893 and sends encrypted information;
  3. Saves some encrypted data to disk;
  4. Searches for files and folder to attack, starting with recently opened files;
  5. Starts the encryption process;
  6. Opens the ransom note;
  7. Launches a command line, executes taskkill and terminates itself;
  8. Hides or removes the original payload executable file.

File attack pattern

  • Modifies the attributes of the target file (to make sure that the encrypting process can operate on it);
  • Reads the file;
  • Encrypts the data in memory;
  • Overwrites the original data with the encrypted data;
  • Renames the original file and includes the specific extension (it does not keep the original file name, nor the original extension);
  • Creates ransom notes in each attacked folders;


Ransome note example


Ransom note example

Conclusion

Cerber ransomware is powerful malware that renders data unreadable and demands ransom for its recovery. TEMASOFT Ranstop offers protection against it and other ransomware, including new and zero-day variants.

Find out more about how protect against Cerber and other ransomware or get a free trial of our anti-ransomware technology.

This post was last modified on August 21, 2023 7:27 am

Calin Ghibu

Technical background: over 15 years experience in testing, developing, researching and managing network security solutions. Currently focusing on information security and IT management. Specialties: Network audit, information security, web security, endpoint security, perimeter security SIEM, legal compliance, competitive intelligence.

Share
Published by
Calin Ghibu
Tags: ranstop

Recent Posts

The Role of File Monitoring Solutions in Maintaining File Integrity

In the digital world, information is often stored and transferred through files. From the most…

May 12, 2023

Guide to Conducting an Efficient File Access Permissions Audit for Admins and Technology Managers

Introduction Data security is more important than ever in today's fast-paced digital world. One critical…

April 9, 2023

File Integrity Monitoring: What It Is and Why It Matters

Introduction: Cyber threats are a growing concern for businesses and individuals alike. With the increasing…

March 5, 2023

Monitoring Essential Microsoft IIS Server Configuration Files for Enhanced Security

Microsoft Internet Information Services (IIS) is a popular web server that is widely used to…

February 25, 2023

Tracking file changes helps admins solve server configuration problems

File tracking is an important aspect of server administration, and it can help administrators detect…

February 1, 2023

Three reasons why admins should use file monitoring solutions

File monitoring solutions are essential tools for administrators to manage and protect their organizations' data…

January 6, 2023