General
-
Target
c17ec37e0515fa380687c26cfb69b4d3
-
Size
21KB
-
Sample
210823-tkt8ak46dx
-
MD5
c17ec37e0515fa380687c26cfb69b4d3
-
SHA1
44ecf08588032a481dd69f3e94626682b631d0c5
-
SHA256
36417f0ea6d948cbd7e003b3cefbb603d886849a8c80e0999c7969b03f2b9c28
-
SHA512
4895fb9633cf923e937a66fa36f3586dbb178ca94b7df2d5ce8aac82af752a035f85b14ed2aa6714d2d6fdbbb3826c6ad5be95d2a44dbe2e3405cb6ee1bde156
Static task
static1
Behavioral task
behavioral1
Sample
c17ec37e0515fa380687c26cfb69b4d3.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
c17ec37e0515fa380687c26cfb69b4d3.dll
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://e2bcb4e05ed008e00zarkzonn.xurvsjipiyubcsta.onion/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.tankmy.space/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.gorise.uno/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.laygive.site/zarkzonn
http://e2bcb4e05ed008e00zarkzonn.loglook.club/zarkzonn
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://463c2600d2381220zarkzonn.xurvsjipiyubcsta.onion/zarkzonn
http://463c2600d2381220zarkzonn.tankmy.space/zarkzonn
http://463c2600d2381220zarkzonn.gorise.uno/zarkzonn
http://463c2600d2381220zarkzonn.laygive.site/zarkzonn
http://463c2600d2381220zarkzonn.loglook.club/zarkzonn
Targets
-
-
Target
c17ec37e0515fa380687c26cfb69b4d3
-
Size
21KB
-
MD5
c17ec37e0515fa380687c26cfb69b4d3
-
SHA1
44ecf08588032a481dd69f3e94626682b631d0c5
-
SHA256
36417f0ea6d948cbd7e003b3cefbb603d886849a8c80e0999c7969b03f2b9c28
-
SHA512
4895fb9633cf923e937a66fa36f3586dbb178ca94b7df2d5ce8aac82af752a035f85b14ed2aa6714d2d6fdbbb3826c6ad5be95d2a44dbe2e3405cb6ee1bde156
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-