General
-
Target
3154ded31015965d68a48be47f904ef6
-
Size
21KB
-
Sample
210823-hktdax7gkn
-
MD5
3154ded31015965d68a48be47f904ef6
-
SHA1
914d15ee52a9822fe4138b51cfb713e7d37ed1b8
-
SHA256
77d3b1cf6d5a0a07090cdb078dce6e3849465c9acde7e1ba66c3893fefc73d4b
-
SHA512
2cec1fabb86263edb30da9e96c5331f3bfff9c707df588127f7daf45d8de87543b43e5f1472b845a6574d71afe26c386c6c954e29a9924d05ea6851c3f009ed1
Static task
static1
Behavioral task
behavioral1
Sample
3154ded31015965d68a48be47f904ef6.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
3154ded31015965d68a48be47f904ef6.dll
Resource
win11
Behavioral task
behavioral3
Sample
3154ded31015965d68a48be47f904ef6.dll
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Documents\readme.txt
magniber
http://ce805680a61492a0aexocpbvek.xurvsjipiyubcsta.onion/xocpbvek
http://ce805680a61492a0aexocpbvek.loglook.club/xocpbvek
http://ce805680a61492a0aexocpbvek.tankmy.space/xocpbvek
http://ce805680a61492a0aexocpbvek.gorise.uno/xocpbvek
http://ce805680a61492a0aexocpbvek.laygive.site/xocpbvek
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://80b40a8014b06a30fxocpbvek.xurvsjipiyubcsta.onion/xocpbvek
http://80b40a8014b06a30fxocpbvek.loglook.club/xocpbvek
http://80b40a8014b06a30fxocpbvek.tankmy.space/xocpbvek
http://80b40a8014b06a30fxocpbvek.gorise.uno/xocpbvek
http://80b40a8014b06a30fxocpbvek.laygive.site/xocpbvek
Targets
-
-
Target
3154ded31015965d68a48be47f904ef6
-
Size
21KB
-
MD5
3154ded31015965d68a48be47f904ef6
-
SHA1
914d15ee52a9822fe4138b51cfb713e7d37ed1b8
-
SHA256
77d3b1cf6d5a0a07090cdb078dce6e3849465c9acde7e1ba66c3893fefc73d4b
-
SHA512
2cec1fabb86263edb30da9e96c5331f3bfff9c707df588127f7daf45d8de87543b43e5f1472b845a6574d71afe26c386c6c954e29a9924d05ea6851c3f009ed1
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-