{"id":92237,"date":"2023-12-13T18:36:59","date_gmt":"2023-12-13T13:06:59","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=92237"},"modified":"2023-12-13T18:36:59","modified_gmt":"2023-12-13T13:06:59","slug":"cerber-ransomware-exposed-a-comprehensive-analysis-of-advanced-tactics-encryption-and-evasion","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/cerber-ransomware-exposed-a-comprehensive-analysis-of-advanced-tactics-encryption-and-evasion\/","title":{"rendered":"Cerber Ransomware Exposed: A Comprehensive Analysis of Advanced Tactics, Encryption, and Evasion"},"content":{"rendered":"<p><span data-contrast=\"none\">Cerber is a strain of ransomware that was first identified in early 2016. It is a type of malware that encrypts a victim&#8217;s files and demands a ransom f<\/span><span data-contrast=\"none\">or the decryption key needed to unlock the files. Cerber, like many other ransomware variants, typically targets individuals and organizations<\/span><span data-contrast=\"none\"> by<\/span><span data-contrast=\"none\"> encrypting their files and demanding a ransom payment<\/span><span data-contrast=\"none\">,<\/span> <span data-contrast=\"none\">(<\/span><span data-contrast=\"none\">usually in cryptocurrencies like Bitcoin<\/span><span data-contrast=\"none\">)<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\"> for the decryption key.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Technical Analysis:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The Cerber ransomware&#8217;s main payload is a custom-packed sample, so the code is <\/span><span data-contrast=\"none\">initially unreadable<\/span><span data-contrast=\"none\">\u00a0at first<\/span><span data-contrast=\"none\">. After unpacking the sample, we can find <\/span><span data-contrast=\"none\">the <\/span><span data-contrast=\"none\">actual payload 376165CCD556CD74658AFEA9F6F428F9. <\/span><span data-contrast=\"none\">As shown in <\/span><span data-contrast=\"none\">Fig <\/span><span data-contrast=\"none\">1<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92244\" aria-describedby=\"caption-attachment-92244\" style=\"width: 469px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92244 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.1_Unpacking-of-cerber-469x390.png\" alt=\"\" width=\"469\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.1_Unpacking-of-cerber-469x390.png 469w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.1_Unpacking-of-cerber-300x249.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.1_Unpacking-of-cerber-150x125.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.1_Unpacking-of-cerber.png 635w\" sizes=\"(max-width: 469px) 100vw, 469px\" \/><figcaption id=\"caption-attachment-92244\" class=\"wp-caption-text\"><em>Fig.1: Unpacking of Cerber<\/em><\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\">When the payload is executed, <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW250994959 BCX8\"><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\">it checks for a specific mutex.<\/span><\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange TrackChangeHoverSelectColorRed SCXW250994959 BCX8\"><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeHoverSelectHighlightRed SCXW250994959 BCX8\">If<\/span><\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\"> any of the<\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW250994959 BCX8\"><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW250994959 BCX8\">se<\/span><\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\"> mutex<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW250994959 BCX8\"><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\">es<\/span><\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\"> are found to be present, the malware will stop its execution. This validation mechanism<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW250994959 BCX8\"><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\">,<\/span><\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\"> involving mutex strings<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW250994959 BCX8\"><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\">,<\/span><\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\"> is built into the <\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\">ransomware<\/span><\/span><span class=\"TextRun SCXW250994959 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW250994959 BCX8\"> code to prevent it from re-infecting the same machine.<\/span><\/span><span class=\"EOP SCXW250994959 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92245\" aria-describedby=\"caption-attachment-92245\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-92245 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex-650x55.png\" alt=\"\" width=\"650\" height=\"55\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex-650x55.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex-768x65.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex-789x67.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex-150x13.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.2_Creating-Mutex.png 1064w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92245\" class=\"wp-caption-text\"><em>Fig.2: Creating Mutex<\/em><\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">Further<\/span><span data-contrast=\"auto\">,<\/span> it <span data-contrast=\"auto\">decrypts<\/span><span data-contrast=\"auto\"> the data using CryptoAPI<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> which contains <\/span><span data-contrast=\"auto\">the <\/span><span data-contrast=\"auto\">following information<\/span><span data-contrast=\"auto\">:<\/span><span data-contrast=\"auto\">,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Blocklisted <\/span><span data-contrast=\"auto\">file<\/span><span data-contrast=\"auto\">s,<\/span><span data-contrast=\"auto\"> extension<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\"> and folders<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Excluded country based on Language ID<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Targeted Extensions<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Base64 encrypted Public RSA key and Ransom Note in HTML format<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0a7\" data-font=\"Wingdings\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Wingdings&quot;,&quot;469769242&quot;:[9642],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0a7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Ransom Note in TXT format<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<figure id=\"attachment_92246\" aria-describedby=\"caption-attachment-92246\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92246\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data-650x146.png\" alt=\"\" width=\"650\" height=\"146\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data-650x146.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data-300x67.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data-768x172.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data-789x177.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data-150x34.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.3_decrypted-data.png 808w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92246\" class=\"wp-caption-text\"><em>Fig.3: Decrypted Data<\/em><\/figcaption><\/figure>\n<p><span class=\"TrackChangeTextInsertion TrackedChange SCXW3800238 BCX8\"><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">The <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW3800238 BCX8\"><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">Ransomware has<\/span><\/span><\/span><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">\u00a0decided to exclude several countries <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW3800238 BCX8\"><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">from <\/span><\/span><\/span><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">the attack (namely, <\/span><\/span><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">Armenia, Azerbaijan, Belarus, Georgia, Kyrgyzstan, Kazakhstan, Moldova, Russia, Turkmenistan, Tajikistan, Ukraine, <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW3800238 BCX8\"><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">and <\/span><\/span><\/span><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">Uzbekistan)<\/span><\/span><span class=\"TextRun SCXW3800238 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW3800238 BCX8\">.<\/span><\/span><span class=\"EOP SCXW3800238 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92247\" aria-describedby=\"caption-attachment-92247\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92247\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes-650x151.png\" alt=\"\" width=\"650\" height=\"151\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes-650x151.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes-300x70.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes-768x179.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes-789x184.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes-150x35.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.4_Excluded-extensions-folders-and-Country-codes.png 1298w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92247\" class=\"wp-caption-text\"><em>Fig.4: Excluded Extensions, folders and country codes<\/em><\/figcaption><\/figure>\n<p><span class=\"TextRun SCXW88882365 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW88882365 BCX8\">Then it traverses the decrypted data and uses its value for further encryption process<\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW88882365 BCX8\"><span class=\"TextRun SCXW88882365 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW88882365 BCX8\">es<\/span><\/span><\/span><span class=\"TextRun SCXW88882365 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW88882365 BCX8\">.<\/span><\/span><span class=\"EOP SCXW88882365 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92248\" aria-describedby=\"caption-attachment-92248\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92248\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data-650x134.png\" alt=\"\" width=\"650\" height=\"134\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data-650x134.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data-300x62.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data-768x158.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data-789x162.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data-150x31.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.5_Traversing-the-data.png 982w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92248\" class=\"wp-caption-text\"><em>Fig.5: Traversing the Data<\/em><\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">Evasion Technique:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cerber exhibits advanced capabilities by <\/span><span data-contrast=\"auto\">identifying <\/span><span data-contrast=\"auto\">and <\/span><span data-contrast=\"auto\">configuring Windows firewall rules to obstruct outbound traffic from the executable binaries of installed firewalls, antivirus, and anti<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">spyware products. This tactic aims to impede the communication and functionality of these security tools, potentially enhancing the <\/span><span data-contrast=\"auto\">ransomware&#8217;s<\/span> <span data-contrast=\"auto\">ability to persist on the compromised system and evade detection. This sophisticated<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">maneuver <\/span><span data-contrast=\"auto\">underscores the evolving nature of Cerber, posing a significant challenge for cybersecurity measures seeking to counteract its impact.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92249\" aria-describedby=\"caption-attachment-92249\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92249\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services-650x220.png\" alt=\"\" width=\"650\" height=\"220\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services-650x220.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services-300x101.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services-768x260.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services-789x267.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services-150x51.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.6_Disabling-AV-services.png 846w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92249\" class=\"wp-caption-text\"><em>Fig.6: Disabling AV Services<\/em><\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">C2 connection:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cerber ransomware establishes connections to port 6893 on IPs specified by CIDR in the configuration. The communication packet initiation involves a hash prefixed with the Machine GUID (MD5_KEY). The packet concludes with parameters such as PARTNER_ID, OS details, IS_X64 (indicating whether the system is 64-bit), IS_ADMIN (reflecting administrative privileges), COUNT_FILES (the count of files on the system), STOP_REASON (reason for stopping), and STATUS (status information). This communication protocol serves as a method for exchanging data with the specified IPs, illustrating the<\/span>\u00a0<span data-contrast=\"auto\">ransomware&#8217;s<\/span> <span data-contrast=\"auto\">sophisticated approach to interaction and control within the compromised system.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">The communication packet starts with a hash consisting of the Machine GUID: {MD5_KEY} and ending with {PARTNER_ID}{OS}{IS_X64}{IS_ADMIN}{COUNT_FILES}{STOP_REASON}{STATUS}.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00a0With Ip varying form ip&#8221;:[&#8220;93.107.12.0\/27&#8243;,&#8221;95.1.200.0\/27&#8243;,&#8221;87.98.176.0\/22&#8221;]<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92250\" aria-describedby=\"caption-attachment-92250\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92250\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection-650x186.png\" alt=\"\" width=\"650\" height=\"186\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection-650x186.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection-300x86.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection-768x220.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection-789x226.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection-150x43.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.7_C2-connection.png 794w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92250\" class=\"wp-caption-text\"><em>Fig.7: C2 Connection<\/em><\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">Encryption:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It drops two files containing the RSA key<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> which <\/span><span data-contrast=\"auto\">is <\/span><span data-contrast=\"auto\">further used for the Encryption process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92251\" aria-describedby=\"caption-attachment-92251\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92251\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file-650x249.png\" alt=\"\" width=\"650\" height=\"249\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file-650x249.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file-300x115.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file-768x294.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file-789x302.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file-150x57.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.8_Adding-part-of-the-key-in-the-tmp-file.png 1060w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92251\" class=\"wp-caption-text\"><em>Fig.8: Adding part of the Key in the Temp File<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_92252\" aria-describedby=\"caption-attachment-92252\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92252\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file-650x226.png\" alt=\"\" width=\"650\" height=\"226\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file-650x226.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file-300x104.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file-768x267.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file-789x275.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file-150x52.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.9_Adding-part-of-the-key-in-the-tmp-file.png 1348w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92252\" class=\"wp-caption-text\"><em>Fig.9: Adding part of the Key in Temp File<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_92253\" aria-describedby=\"caption-attachment-92253\" style=\"width: 458px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-92253\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.10_Use-of-Crypto-API.png\" alt=\"\" width=\"458\" height=\"242\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.10_Use-of-Crypto-API.png 458w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.10_Use-of-Crypto-API-300x159.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.10_Use-of-Crypto-API-150x79.png 150w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><figcaption id=\"caption-attachment-92253\" class=\"wp-caption-text\"><em>Fig.10: Use of Crypto API<\/em><\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">It implements <\/span><span data-contrast=\"auto\">RSA and RC4 algorithms in its encryption routine and the use of CryptoAPI &#8211; <\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\"> separate function that reads and <\/span><span data-contrast=\"auto\">skips <\/span><span data-contrast=\"auto\">the first 1800 bytes, encrypts the rest of the content<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and <\/span><span data-contrast=\"auto\">writes <\/span><span data-contrast=\"auto\">back to <\/span><span data-contrast=\"auto\">the <\/span><span data-contrast=\"auto\">file<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> as <\/span><span data-contrast=\"auto\">m<\/span><span data-contrast=\"auto\">entioned in <\/span><span data-contrast=\"auto\">F<\/span><span data-contrast=\"auto\">ig. 12.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Following the encryption process, the ransomware appends a &#8220;.a769&#8221; extension and <\/span><span data-contrast=\"auto\">renames <\/span><span data-contrast=\"auto\">the file <\/span><span data-contrast=\"auto\">with <\/span><span data-contrast=\"auto\">a <\/span><span data-contrast=\"auto\">randomly generated string with pattern [0-9a-zA-Z_-]{10}. The figure below illustrates the files that have undergone this encryption and changes in file names and <\/span><span data-contrast=\"auto\">extensions.<\/span><\/p>\n<figure id=\"attachment_92254\" aria-describedby=\"caption-attachment-92254\" style=\"width: 551px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-92254\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.11_Encrypted-files.png\" alt=\"\" width=\"551\" height=\"156\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.11_Encrypted-files.png 551w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.11_Encrypted-files-300x85.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.11_Encrypted-files-150x42.png 150w\" sizes=\"(max-width: 551px) 100vw, 551px\" \/><figcaption id=\"caption-attachment-92254\" class=\"wp-caption-text\"><em>Fig.11: Encrypted Files<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_92255\" aria-describedby=\"caption-attachment-92255\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92255\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header-650x257.png\" alt=\"\" width=\"650\" height=\"257\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header-650x257.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header-300x119.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header-768x303.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header-789x312.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header-150x59.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.12_Skipping-1800-bytes-from-the-header.png 1086w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92255\" class=\"wp-caption-text\"><em>Fig.12: Skipping 1800 bytes from the Header<\/em><\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">Ransom notes:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It drops the ransom notes<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">in the folders <\/span><span data-contrast=\"auto\">with the encrypted files, with <\/span><span data-contrast=\"auto\">the <\/span><span data-contrast=\"auto\">name &#8220;__R_E_A_D__T_H_I_S__.html&#8221; and TXT form. In this ransom note, the threat actors (TAs) instructs <\/span><span data-contrast=\"auto\">the victims to contact them via their TOR website. Furthermore, the TAs issue a warning that if the victims fail to <\/span><span data-contrast=\"auto\">contact within 30 days following the ransomware attack, the<\/span><span data-contrast=\"auto\">y will<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">disclose the<\/span> <span data-contrast=\"auto\">victim<\/span><span data-contrast=\"auto\">&#8216;<\/span><span data-contrast=\"auto\">s <\/span><span data-contrast=\"auto\">confidential data on public news outlets and websites<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92256\" aria-describedby=\"caption-attachment-92256\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92256\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format-650x371.png\" alt=\"\" width=\"650\" height=\"371\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format-650x371.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format-300x171.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format-768x439.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format-789x451.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format-150x86.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.13_Dropped-Ransom-Note-in-TXT-format.png 972w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92256\" class=\"wp-caption-text\"><em>Fig.13: Dropped Ransom Note in TXT Format<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_92257\" aria-describedby=\"caption-attachment-92257\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92257\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file-650x280.png\" alt=\"\" width=\"650\" height=\"280\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file-650x280.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file-300x129.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file-768x330.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file-789x339.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file-150x65.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.14_Dropped-Ransom-Note-in-HTML-file.png 1237w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92257\" class=\"wp-caption-text\"><em>Fig.14_Dropped Ransom Note in HTML File<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_92258\" aria-describedby=\"caption-attachment-92258\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-92258\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper-650x302.png\" alt=\"\" width=\"650\" height=\"302\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper-650x302.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper-300x139.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper-768x357.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper-789x367.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper-150x70.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.15_Changed-desktop-wallpaper.png 1100w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-92258\" class=\"wp-caption-text\"><em>Fig.15: Changed Desktop Wallpaper<\/em><\/figcaption><\/figure>\n<p><b><span data-contrast=\"auto\">Post Encryption:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Following infection, the ransomware employs the ShellExecuteA() API function with specific arguments to eliminate its own file from the compromised system. Through this action, the malware orchestrates the removal of its executable, leaving behind solely the encrypted files and the accompanying ransom note. This deliberate self-deletion mechanism indicates an attempt by the ransomware to conceal its presence, complicating post-infection analysis and removal efforts while ensuring the persistence of the encrypted files and the associated ransom demand<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_92259\" aria-describedby=\"caption-attachment-92259\" style=\"width: 435px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-92259\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.16_1-Self-delete-using-ShellExecuteA-function.png\" alt=\"\" width=\"435\" height=\"116\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_1-Self-delete-using-ShellExecuteA-function.png 435w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_1-Self-delete-using-ShellExecuteA-function-300x80.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_1-Self-delete-using-ShellExecuteA-function-150x40.png 150w\" sizes=\"(max-width: 435px) 100vw, 435px\" \/><figcaption id=\"caption-attachment-92259\" class=\"wp-caption-text\"><em>Fig.16: Self-delete using Shell ExecuteA function<\/em><\/figcaption><\/figure>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-92260\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function-650x99.png\" alt=\"\" width=\"650\" height=\"99\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function-650x99.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function-300x46.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function-768x117.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function-789x120.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function-150x23.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/Fig.16_2_Self-delete-using-ShellExecuteA-function.png 809w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p><b><span data-contrast=\"auto\">Precaution of Cerber Ransomware\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cerber Ransomware is a type of malware that encrypts a victim&#8217;s files and demands a ransom for the decryption key. To protect yourself and your computer systems from Cerber Ransomware,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">or <\/span><span data-contrast=\"auto\">ransomware in general, it is <\/span><span data-contrast=\"auto\">important<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">to take various<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">precautions. Here are <\/span><span data-contrast=\"auto\">a few <\/span><span data-contrast=\"auto\">some <\/span><span data-contrast=\"auto\">steps <\/span><span data-contrast=\"auto\">measures <\/span><span data-contrast=\"auto\">you can take to minimize your risk:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Regularly Backup Your Data:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Back up your important data regularly to an external device or a cloud service. This way, if your files are encrypted, you won&#8217;t have to pay a ransom to recover them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Keep Your Software Updated:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Ensure that your operating system and all software, including your antivirus program, are up to date. Ransomware often takes advantage of known vulnerabilities in outdated software.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Use Strong, Unique Passwords:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Use strong and complex passwords for all your accounts and devices. Consider using a reputable password manager to generate and store strong passwords.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Enable Two-Factor Authentication (2FA):<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Enable 2FA whenever possible for your online accounts. This provides an extra layer of security, making it more difficult for attackers to access your accounts.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Exercise Caution with Email:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Be wary of email attachments and links, especially <\/span><span data-contrast=\"auto\">if they come <\/span><span data-contrast=\"auto\">from unknown or unexpected sources. Ransomware can be delivered through phishing emails.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Install a Reliable Antivirus Program:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Install and regularly update a reputable antivirus or anti-malware software. Make sure it includes real-time scanning and ransomware protection features.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Use a Firewall:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A good firewall can help block incoming threats and reduce the likelihood of a malware infection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Regularly Update and Patch:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Keep your system and software updated. Many ransomware attacks exploit vulnerabilities in outdated software, so patching these vulnerabilities is essential.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Network Security:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Implement network security measures, such as intrusion detection systems<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and regularly audit network traffic for unusual activity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Monitor for Suspicious Activity:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Keep an eye out for any unusual or suspicious activity on your computer or network, as early detection can help stop an infection from spreading.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Regularly Test Backups:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Periodically test your backups to ensure that they can be successfully restored.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Quick Heal Protection:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ransom.Cerber.S443347<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ransom.Cerber.S126609<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ransom.Cerber.S22591<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ransom.Cerber.S1538045<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Conclusion:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cerber ransomware, <\/span><span data-contrast=\"auto\">first <\/span><span data-contrast=\"auto\">identified in 2016, represents a highly sophisticated threat with advanced evasion techniques. It<\/span><span data-contrast=\"auto\"> can <\/span><span data-contrast=\"auto\">configure Windows firewall rules, <\/span><span data-contrast=\"auto\">exclud<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\"> specific countries from attacks, and employ persistence on compromised systems.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">It combines <\/span><span data-contrast=\"auto\">RSA<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and RC4 algorithms in the encryption process<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\"> and uses the self-deletion mechanism post-infection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>\u00a0MITRE ATTACK TTPs:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-92263\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/12\/image.png\" alt=\"\" width=\"614\" height=\"238\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/image.png 614w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/image-300x116.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/12\/image-150x58.png 150w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">IOCs:<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">FE1BC60A95B2C2D77CD5D232296A7FA4<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">376165CCD556CD74658AFEA9F6F428F9<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Authors: <\/span><\/b><\/p>\n<p><b><span data-contrast=\"auto\">Soumen Burma<\/span><\/b><b><span data-contrast=\"auto\">\u00a0<\/span><\/b><\/p>\n<p><b><span data-contrast=\"auto\">Vaibhav Krushna Billade<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cerber is a strain of ransomware that was first identified in early 2016. It is a type of malware that encrypts a victim&#8217;s files and demands a ransom for the decryption key needed to unlock the files. Cerber, like many other ransomware variants, typically targets individuals and organizations by encrypting their files and demanding a [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":92239,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1660,1653,164,289,1739,1671,133,1495,910,1],"tags":[1956,431,1428,372,1249],"class_list":["post-92237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-antivirus","category-cyber-crime","category-cyber-safety","category-cybersecurity","category-encryption","category-hacker","category-nransomware","category-ransomware","category-uncategorized","tag-quickheal-ransomware-cybersecurity-hacking-ransomwareprevention-threatintelligence","tag-android","tag-cerber-ransomware","tag-digital-safety","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92237"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=92237"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92237\/revisions"}],"predecessor-version":[{"id":92265,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/92237\/revisions\/92265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/92239"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=92237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=92237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=92237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}