General
-
Target
9.exe
-
Size
21KB
-
Sample
210622-9bz3gj47bj
-
MD5
6e4d7e63e05ef919d2b8724fbc3f3eeb
-
SHA1
97730b10da62c23ee6554625f5c24bf262aae261
-
SHA256
a5a2b6bfba012554d3c7e01c9df1173f995639caf31fdde8693e30ef501d26d7
-
SHA512
641c16245535d0e7eff19063830f8b8448d51fdefd6384a615495709b203c1522603292140b951cd220d1cd22e0f414f5c0e156633b2eb69f8ecf7fde8cdef86
Static task
static1
Behavioral task
behavioral1
Sample
9.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://5624184026784a70dassdxwead.ndkeblzjnpqgpo5o.onion/ssdxwead
http://5624184026784a70dassdxwead.lieedge.casa/ssdxwead
http://5624184026784a70dassdxwead.wonride.site/ssdxwead
http://5624184026784a70dassdxwead.lognear.xyz/ssdxwead
http://5624184026784a70dassdxwead.bejoin.space/ssdxwead
Targets
-
-
Target
9.exe
-
Size
21KB
-
MD5
6e4d7e63e05ef919d2b8724fbc3f3eeb
-
SHA1
97730b10da62c23ee6554625f5c24bf262aae261
-
SHA256
a5a2b6bfba012554d3c7e01c9df1173f995639caf31fdde8693e30ef501d26d7
-
SHA512
641c16245535d0e7eff19063830f8b8448d51fdefd6384a615495709b203c1522603292140b951cd220d1cd22e0f414f5c0e156633b2eb69f8ecf7fde8cdef86
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-