General
-
Target
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51.dll
-
Size
21KB
-
Sample
210819-7xxlq9brfj
-
MD5
f9147aeda18f71043955420e853b8d3c
-
SHA1
a9c6995a91ac8ac6c76379fd38c3fb973273d3b3
-
SHA256
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51
-
SHA512
3e38ce57ada7a3fc22c2caf6a882574427c3d0b73cbfc337853017995f27688a5f344157f893f1a70cec2ced15a4a553010031b54e813cacb430670ecd8c251f
Static task
static1
Behavioral task
behavioral1
Sample
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51.dll
Resource
win11
Behavioral task
behavioral3
Sample
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51.dll
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://081c78083c14c040d2dgvzumt.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dgvzumt
http://081c78083c14c040d2dgvzumt.codehes.uno/dgvzumt
http://081c78083c14c040d2dgvzumt.partscs.site/dgvzumt
http://081c78083c14c040d2dgvzumt.uponmix.xyz/dgvzumt
http://081c78083c14c040d2dgvzumt.flysex.space/dgvzumt
Extracted
C:\Users\Admin\Documents\readme.txt
magniber
http://5c047c48481492a0b0dgvzumt.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dgvzumt
http://5c047c48481492a0b0dgvzumt.codehes.uno/dgvzumt
http://5c047c48481492a0b0dgvzumt.partscs.site/dgvzumt
http://5c047c48481492a0b0dgvzumt.uponmix.xyz/dgvzumt
http://5c047c48481492a0b0dgvzumt.flysex.space/dgvzumt
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://7c6c04e8c0ec44d034dgvzumt.l5nmxg2syswnc6s3724evnip5uktj7msy3pgowkbcidbei3nbysi7ead.onion/dgvzumt
http://7c6c04e8c0ec44d034dgvzumt.codehes.uno/dgvzumt
http://7c6c04e8c0ec44d034dgvzumt.partscs.site/dgvzumt
http://7c6c04e8c0ec44d034dgvzumt.uponmix.xyz/dgvzumt
http://7c6c04e8c0ec44d034dgvzumt.flysex.space/dgvzumt
Targets
-
-
Target
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51.dll
-
Size
21KB
-
MD5
f9147aeda18f71043955420e853b8d3c
-
SHA1
a9c6995a91ac8ac6c76379fd38c3fb973273d3b3
-
SHA256
22c59e19315ba81452b67c271d46980fac9bc1e6082bed6efcc270e669479d51
-
SHA512
3e38ce57ada7a3fc22c2caf6a882574427c3d0b73cbfc337853017995f27688a5f344157f893f1a70cec2ced15a4a553010031b54e813cacb430670ecd8c251f
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-