General
-
Target
magnibar_2cf60c433df3dcc84b80e18c93e578bf18b31c5c49777953702c53166275796b.exe
-
Size
21KB
-
Sample
210722-q1byeqe2q2
-
MD5
2953b6ec692537f8eace1077081f9e43
-
SHA1
6db28862c0dbb589b918f812ff61cfdac0248eab
-
SHA256
2cf60c433df3dcc84b80e18c93e578bf18b31c5c49777953702c53166275796b
-
SHA512
11959d3841c3824e5d4c68771f67db6227423d99f5beb6559c165081b6300fb3553633ce871157bd972845730fcc9e1201c10507f114d7458b3940c8cdf0ca85
Static task
static1
Behavioral task
behavioral1
Sample
magnibar_2cf60c433df3dcc84b80e18c93e578bf18b31c5c49777953702c53166275796b.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
magnibar_2cf60c433df3dcc84b80e18c93e578bf18b31c5c49777953702c53166275796b.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://0a9858c862607e508kmxfykjdz.5s4ixqul2enwxrqv.onion/kmxfykjdz
http://0a9858c862607e508kmxfykjdz.bestep.cyou/kmxfykjdz
http://0a9858c862607e508kmxfykjdz.plughas.casa/kmxfykjdz
http://0a9858c862607e508kmxfykjdz.ownhits.space/kmxfykjdz
http://0a9858c862607e508kmxfykjdz.dayhit.xyz/kmxfykjdz
Targets
-
-
Target
magnibar_2cf60c433df3dcc84b80e18c93e578bf18b31c5c49777953702c53166275796b.exe
-
Size
21KB
-
MD5
2953b6ec692537f8eace1077081f9e43
-
SHA1
6db28862c0dbb589b918f812ff61cfdac0248eab
-
SHA256
2cf60c433df3dcc84b80e18c93e578bf18b31c5c49777953702c53166275796b
-
SHA512
11959d3841c3824e5d4c68771f67db6227423d99f5beb6559c165081b6300fb3553633ce871157bd972845730fcc9e1201c10507f114d7458b3940c8cdf0ca85
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-