General
-
Target
magnibar_5301e5deb37674296e48d5873862ce32f934fbdfe1a7919f97bddb1138957e35.exe
-
Size
21KB
-
Sample
210722-p7mlm674m2
-
MD5
191889cccd8827cb28b5cf9c3a559366
-
SHA1
c1a6bc0e5d66524eaefa935e9d1dca0c9223bead
-
SHA256
5301e5deb37674296e48d5873862ce32f934fbdfe1a7919f97bddb1138957e35
-
SHA512
6d3af286eaa1c3051a739edeaa5f5684f31ff0575082bcd1c2155acfa82657b06b70d7aefc55be3dc1f0877cd4ca77b13f9e53720f5123339bf85eb36bfdfcdf
Static task
static1
Behavioral task
behavioral1
Sample
magnibar_5301e5deb37674296e48d5873862ce32f934fbdfe1a7919f97bddb1138957e35.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
magnibar_5301e5deb37674296e48d5873862ce32f934fbdfe1a7919f97bddb1138957e35.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://0ab812b814784a70bauxkhdcf.ndkeblzjnpqgpo5o.onion/uxkhdcf
http://0ab812b814784a70bauxkhdcf.bejoin.space/uxkhdcf
http://0ab812b814784a70bauxkhdcf.lieedge.casa/uxkhdcf
http://0ab812b814784a70bauxkhdcf.wonride.site/uxkhdcf
http://0ab812b814784a70bauxkhdcf.lognear.xyz/uxkhdcf
Targets
-
-
Target
magnibar_5301e5deb37674296e48d5873862ce32f934fbdfe1a7919f97bddb1138957e35.exe
-
Size
21KB
-
MD5
191889cccd8827cb28b5cf9c3a559366
-
SHA1
c1a6bc0e5d66524eaefa935e9d1dca0c9223bead
-
SHA256
5301e5deb37674296e48d5873862ce32f934fbdfe1a7919f97bddb1138957e35
-
SHA512
6d3af286eaa1c3051a739edeaa5f5684f31ff0575082bcd1c2155acfa82657b06b70d7aefc55be3dc1f0877cd4ca77b13f9e53720f5123339bf85eb36bfdfcdf
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-