Resubmissions

18-08-2021 21:12

210818-4y2nlxfp46 10

19-05-2021 11:54

210519-macc77ed1x 10

General

  • Target

    3ad0af44a4269c0121eeb19cee197a90b4a7e862b5ce04eab6aafc021dd6e7a3.exe

  • Size

    22KB

  • Sample

    210519-macc77ed1x

  • MD5

    8cd81ae69ade058076263addc8dd3ebb

  • SHA1

    362eb81ecac33897d4dd2a3f175efaaf0fe2c2f5

  • SHA256

    3ad0af44a4269c0121eeb19cee197a90b4a7e862b5ce04eab6aafc021dd6e7a3

  • SHA512

    6170bc3191b8d88043b5c7799c17338f4717af087fa4524141955d2e6cfb0cb468262bcc5c466fe39adfbc534796a79e06d84894ae9f7911b2353460580dac21

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme.txt

Family

magniber

Ransom Note
ALL YOUR DOCUMENTS PHOTOS DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ==================================================================================================== Your files are NOT damaged! Your files are modified only. This modification is reversible. The only 1 way to decrypt your files is to receive the private key and decryption program. Any attempts to restore your files with the third party software will be fatal for your files! ==================================================================================================== To receive the private key and decryption program follow the instructions below: 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://72601420c2784a70b4qwfekni.n5fnrf4l7bdjhelx.onion/qwfekni Note! This page is available via "Tor Browser" only. ==================================================================================================== Also you can use temporary addresses on your personal page without using "Tor Browser": http://72601420c2784a70b4qwfekni.perages.cyou/qwfekni http://72601420c2784a70b4qwfekni.aimdrop.fit/qwfekni http://72601420c2784a70b4qwfekni.soblack.xyz/qwfekni http://72601420c2784a70b4qwfekni.sixsees.club/qwfekni Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://72601420c2784a70b4qwfekni.n5fnrf4l7bdjhelx.onion/qwfekni

http://72601420c2784a70b4qwfekni.perages.cyou/qwfekni

http://72601420c2784a70b4qwfekni.aimdrop.fit/qwfekni

http://72601420c2784a70b4qwfekni.soblack.xyz/qwfekni

http://72601420c2784a70b4qwfekni.sixsees.club/qwfekni

Targets

    • Target

      3ad0af44a4269c0121eeb19cee197a90b4a7e862b5ce04eab6aafc021dd6e7a3.exe

    • Size

      22KB

    • MD5

      8cd81ae69ade058076263addc8dd3ebb

    • SHA1

      362eb81ecac33897d4dd2a3f175efaaf0fe2c2f5

    • SHA256

      3ad0af44a4269c0121eeb19cee197a90b4a7e862b5ce04eab6aafc021dd6e7a3

    • SHA512

      6170bc3191b8d88043b5c7799c17338f4717af087fa4524141955d2e6cfb0cb468262bcc5c466fe39adfbc534796a79e06d84894ae9f7911b2353460580dac21

    Score
    10/10
    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Impact

Inhibit System Recovery

2
T1490

Tasks