General
-
Target
4a8291d1b7e90e942220471d1335a544d59791d693a3065f0cff46632cd821c7.exe
-
Size
21KB
-
Sample
210620-4jbkjfm14e
-
MD5
e0fa3beea2fdf9c48e26d128f624aa90
-
SHA1
d853e4f29d2832c3830441613cfe7f23889c660e
-
SHA256
4a8291d1b7e90e942220471d1335a544d59791d693a3065f0cff46632cd821c7
-
SHA512
4a549ec73a4e0fbc5285152bcb5c35da95d9bcc79e7f0b1c1d844bc4ce5d6639084246fea4a7e79285a12c82fa59046cef8a77870db895f573a88df6ec601dcf
Static task
static1
Behavioral task
behavioral1
Sample
4a8291d1b7e90e942220471d1335a544d59791d693a3065f0cff46632cd821c7.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4a8291d1b7e90e942220471d1335a544d59791d693a3065f0cff46632cd821c7.exe
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://e4c440b8b640c0c0cnaoekeon.ndkeblzjnpqgpo5o.onion/cnaoekeon
http://e4c440b8b640c0c0cnaoekeon.wonride.site/cnaoekeon
http://e4c440b8b640c0c0cnaoekeon.lieedge.casa/cnaoekeon
http://e4c440b8b640c0c0cnaoekeon.bejoin.space/cnaoekeon
http://e4c440b8b640c0c0cnaoekeon.oddfelt.casa/cnaoekeon
Targets
-
-
Target
4a8291d1b7e90e942220471d1335a544d59791d693a3065f0cff46632cd821c7.exe
-
Size
21KB
-
MD5
e0fa3beea2fdf9c48e26d128f624aa90
-
SHA1
d853e4f29d2832c3830441613cfe7f23889c660e
-
SHA256
4a8291d1b7e90e942220471d1335a544d59791d693a3065f0cff46632cd821c7
-
SHA512
4a549ec73a4e0fbc5285152bcb5c35da95d9bcc79e7f0b1c1d844bc4ce5d6639084246fea4a7e79285a12c82fa59046cef8a77870db895f573a88df6ec601dcf
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-