General
-
Target
10.exe
-
Size
21KB
-
Sample
210622-fefn2rwnlx
-
MD5
89dec4d6bfe84c184bba66cb88e9e9b1
-
SHA1
9ef17ae9e70f9ce851a2460028da272d4828e270
-
SHA256
2852f76a016cf31d51a7d59a77857bee6285f59c95d6bcb8cd83b83640adbb69
-
SHA512
37f057cf49cc6e2626e6a3881898cff4d1956bfe73770f7bf35c0e2afbcd04f772eed88ea997eda74c402986d7d234f58269efe695a4a25eddfe7ded8e98a4c0
Static task
static1
Behavioral task
behavioral1
Sample
10.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
10.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://22ecca08ea784a70d8ovlamrdt.5s4ixqul2enwxrqv.onion/ovlamrdt
http://22ecca08ea784a70d8ovlamrdt.dayhit.xyz/ovlamrdt
http://22ecca08ea784a70d8ovlamrdt.bestep.cyou/ovlamrdt
http://22ecca08ea784a70d8ovlamrdt.ownhits.space/ovlamrdt
http://22ecca08ea784a70d8ovlamrdt.plughas.casa/ovlamrdt
Targets
-
-
Target
10.exe
-
Size
21KB
-
MD5
89dec4d6bfe84c184bba66cb88e9e9b1
-
SHA1
9ef17ae9e70f9ce851a2460028da272d4828e270
-
SHA256
2852f76a016cf31d51a7d59a77857bee6285f59c95d6bcb8cd83b83640adbb69
-
SHA512
37f057cf49cc6e2626e6a3881898cff4d1956bfe73770f7bf35c0e2afbcd04f772eed88ea997eda74c402986d7d234f58269efe695a4a25eddfe7ded8e98a4c0
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-