General

  • Target

    9.exe

  • Size

    21KB

  • Sample

    210622-9bz3gj47bj

  • MD5

    6e4d7e63e05ef919d2b8724fbc3f3eeb

  • SHA1

    97730b10da62c23ee6554625f5c24bf262aae261

  • SHA256

    a5a2b6bfba012554d3c7e01c9df1173f995639caf31fdde8693e30ef501d26d7

  • SHA512

    641c16245535d0e7eff19063830f8b8448d51fdefd6384a615495709b203c1522603292140b951cd220d1cd22e0f414f5c0e156633b2eb69f8ecf7fde8cdef86

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme.txt

Family

magniber

Ransom Note
ALL YOUR DOCUMENTS PHOTOS DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ==================================================================================================== Your files are NOT damaged! Your files are modified only. This modification is reversible. The only 1 way to decrypt your files is to receive the private key and decryption program. Any attempts to restore your files with the third party software will be fatal for your files! ==================================================================================================== To receive the private key and decryption program follow the instructions below: 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://5624184026784a70dassdxwead.ndkeblzjnpqgpo5o.onion/ssdxwead Note! This page is available via "Tor Browser" only. ==================================================================================================== Also you can use temporary addresses on your personal page without using "Tor Browser": http://5624184026784a70dassdxwead.lieedge.casa/ssdxwead http://5624184026784a70dassdxwead.wonride.site/ssdxwead http://5624184026784a70dassdxwead.lognear.xyz/ssdxwead http://5624184026784a70dassdxwead.bejoin.space/ssdxwead Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://5624184026784a70dassdxwead.ndkeblzjnpqgpo5o.onion/ssdxwead

http://5624184026784a70dassdxwead.lieedge.casa/ssdxwead

http://5624184026784a70dassdxwead.wonride.site/ssdxwead

http://5624184026784a70dassdxwead.lognear.xyz/ssdxwead

http://5624184026784a70dassdxwead.bejoin.space/ssdxwead

Targets

    • Target

      9.exe

    • Size

      21KB

    • MD5

      6e4d7e63e05ef919d2b8724fbc3f3eeb

    • SHA1

      97730b10da62c23ee6554625f5c24bf262aae261

    • SHA256

      a5a2b6bfba012554d3c7e01c9df1173f995639caf31fdde8693e30ef501d26d7

    • SHA512

      641c16245535d0e7eff19063830f8b8448d51fdefd6384a615495709b203c1522603292140b951cd220d1cd22e0f414f5c0e156633b2eb69f8ecf7fde8cdef86

    Score
    10/10
    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks