General

  • Target

    8.exe

  • Size

    21KB

  • Sample

    210622-aezm899mqs

  • MD5

    4a30853a3699ae354d8a238558ed59dd

  • SHA1

    9494865a139853498338b0dc505bd36cc59b6bae

  • SHA256

    3f06e0fa1a8d27d1d1f9d82462acc41b757e1a82b34d5d8e0354f024262a6fc9

  • SHA512

    09bc363d9d62700cf5a7066121e4359f000a6affc8aa04fb642dff8963d0b42f2cc2b02787b1529b2fdcea2d1332a353337199ff364a19cac1504e7ed18d706d

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme.txt

Family

magniber

Ransom Note
ALL YOUR DOCUMENTS PHOTOS DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ==================================================================================================== Your files are NOT damaged! Your files are modified only. This modification is reversible. The only 1 way to decrypt your files is to receive the private key and decryption program. Any attempts to restore your files with the third party software will be fatal for your files! ==================================================================================================== To receive the private key and decryption program follow the instructions below: 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://9c741e708ed008e0cqsydkxb.ndkeblzjnpqgpo5o.onion/qsydkxb Note! This page is available via "Tor Browser" only. ==================================================================================================== Also you can use temporary addresses on your personal page without using "Tor Browser": http://9c741e708ed008e0cqsydkxb.bejoin.space/qsydkxb http://9c741e708ed008e0cqsydkxb.lognear.xyz/qsydkxb http://9c741e708ed008e0cqsydkxb.lieedge.casa/qsydkxb http://9c741e708ed008e0cqsydkxb.wonride.site/qsydkxb Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://9c741e708ed008e0cqsydkxb.ndkeblzjnpqgpo5o.onion/qsydkxb

http://9c741e708ed008e0cqsydkxb.bejoin.space/qsydkxb

http://9c741e708ed008e0cqsydkxb.lognear.xyz/qsydkxb

http://9c741e708ed008e0cqsydkxb.lieedge.casa/qsydkxb

http://9c741e708ed008e0cqsydkxb.wonride.site/qsydkxb

Targets

    • Target

      8.exe

    • Size

      21KB

    • MD5

      4a30853a3699ae354d8a238558ed59dd

    • SHA1

      9494865a139853498338b0dc505bd36cc59b6bae

    • SHA256

      3f06e0fa1a8d27d1d1f9d82462acc41b757e1a82b34d5d8e0354f024262a6fc9

    • SHA512

      09bc363d9d62700cf5a7066121e4359f000a6affc8aa04fb642dff8963d0b42f2cc2b02787b1529b2fdcea2d1332a353337199ff364a19cac1504e7ed18d706d

    Score
    10/10
    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks