General

  • Target

    10.exe

  • Size

    21KB

  • Sample

    210622-fefn2rwnlx

  • MD5

    89dec4d6bfe84c184bba66cb88e9e9b1

  • SHA1

    9ef17ae9e70f9ce851a2460028da272d4828e270

  • SHA256

    2852f76a016cf31d51a7d59a77857bee6285f59c95d6bcb8cd83b83640adbb69

  • SHA512

    37f057cf49cc6e2626e6a3881898cff4d1956bfe73770f7bf35c0e2afbcd04f772eed88ea997eda74c402986d7d234f58269efe695a4a25eddfe7ded8e98a4c0

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\readme.txt

Family

magniber

Ransom Note
ALL YOUR DOCUMENTS PHOTOS DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ==================================================================================================== Your files are NOT damaged! Your files are modified only. This modification is reversible. The only 1 way to decrypt your files is to receive the private key and decryption program. Any attempts to restore your files with the third party software will be fatal for your files! ==================================================================================================== To receive the private key and decryption program follow the instructions below: 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://22ecca08ea784a70d8ovlamrdt.5s4ixqul2enwxrqv.onion/ovlamrdt Note! This page is available via "Tor Browser" only. ==================================================================================================== Also you can use temporary addresses on your personal page without using "Tor Browser": http://22ecca08ea784a70d8ovlamrdt.dayhit.xyz/ovlamrdt http://22ecca08ea784a70d8ovlamrdt.bestep.cyou/ovlamrdt http://22ecca08ea784a70d8ovlamrdt.ownhits.space/ovlamrdt http://22ecca08ea784a70d8ovlamrdt.plughas.casa/ovlamrdt Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://22ecca08ea784a70d8ovlamrdt.5s4ixqul2enwxrqv.onion/ovlamrdt

http://22ecca08ea784a70d8ovlamrdt.dayhit.xyz/ovlamrdt

http://22ecca08ea784a70d8ovlamrdt.bestep.cyou/ovlamrdt

http://22ecca08ea784a70d8ovlamrdt.ownhits.space/ovlamrdt

http://22ecca08ea784a70d8ovlamrdt.plughas.casa/ovlamrdt

Targets

    • Target

      10.exe

    • Size

      21KB

    • MD5

      89dec4d6bfe84c184bba66cb88e9e9b1

    • SHA1

      9ef17ae9e70f9ce851a2460028da272d4828e270

    • SHA256

      2852f76a016cf31d51a7d59a77857bee6285f59c95d6bcb8cd83b83640adbb69

    • SHA512

      37f057cf49cc6e2626e6a3881898cff4d1956bfe73770f7bf35c0e2afbcd04f772eed88ea997eda74c402986d7d234f58269efe695a4a25eddfe7ded8e98a4c0

    Score
    10/10
    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks