General
-
Target
a60c5212d52fe1488d2f82989a2947d2
-
Size
21KB
-
Sample
210818-a3lth275jn
-
MD5
a60c5212d52fe1488d2f82989a2947d2
-
SHA1
0a744d6c76902d28eb6687d66c18b0a354f29b9d
-
SHA256
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e
-
SHA512
afd14daa5bd9448e09f25d561e8be34e16f93a2825129d165e817a4a2a3ffc339efefd6f26e78c4853acfbce7f51c88b81601324b123d8c377d72da15dcf9327
Static task
static1
Behavioral task
behavioral1
Sample
a60c5212d52fe1488d2f82989a2947d2.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a60c5212d52fe1488d2f82989a2947d2.dll
Resource
win11
Behavioral task
behavioral3
Sample
a60c5212d52fe1488d2f82989a2947d2.dll
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://5a4cd0e05214c040f2dihlxbl.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dihlxbl
http://5a4cd0e05214c040f2dihlxbl.uponmix.xyz/dihlxbl
http://5a4cd0e05214c040f2dihlxbl.flysex.space/dihlxbl
http://5a4cd0e05214c040f2dihlxbl.partscs.site/dihlxbl
http://5a4cd0e05214c040f2dihlxbl.codehes.uno/dihlxbl
Extracted
C:\Users\Admin\Documents\readme.txt
magniber
http://78702cc0041492a03edihlxbl.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dihlxbl
http://78702cc0041492a03edihlxbl.uponmix.xyz/dihlxbl
http://78702cc0041492a03edihlxbl.flysex.space/dihlxbl
http://78702cc0041492a03edihlxbl.partscs.site/dihlxbl
http://78702cc0041492a03edihlxbl.codehes.uno/dihlxbl
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://6c5c7a8864ec44d0ccdihlxbl.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dihlxbl
http://6c5c7a8864ec44d0ccdihlxbl.uponmix.xyz/dihlxbl
http://6c5c7a8864ec44d0ccdihlxbl.flysex.space/dihlxbl
http://6c5c7a8864ec44d0ccdihlxbl.partscs.site/dihlxbl
http://6c5c7a8864ec44d0ccdihlxbl.codehes.uno/dihlxbl
Targets
-
-
Target
a60c5212d52fe1488d2f82989a2947d2
-
Size
21KB
-
MD5
a60c5212d52fe1488d2f82989a2947d2
-
SHA1
0a744d6c76902d28eb6687d66c18b0a354f29b9d
-
SHA256
10b9b1d8f6bafd9bb57ccfb1da4a658f10207d566781fa5fb3c4394d283e860e
-
SHA512
afd14daa5bd9448e09f25d561e8be34e16f93a2825129d165e817a4a2a3ffc339efefd6f26e78c4853acfbce7f51c88b81601324b123d8c377d72da15dcf9327
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-