General
-
Target
e84e3a6b5db3f402f912a7afb328cb61
-
Size
21KB
-
Sample
210823-v2edeqwd8n
-
MD5
e84e3a6b5db3f402f912a7afb328cb61
-
SHA1
f57f4f7d2358c5b00a9a39fcdbb0d668e503dedc
-
SHA256
66c4f54da6542339de036872e80306f345b8572a71e782434245455e03541465
-
SHA512
1c60484518b489beb748641ee3983c698ed6253c63abc7818cf76e7fd76944977f1b83c7a762bd16f40945adf646b80de4058f59d775b708b276f754bbf63c91
Static task
static1
Behavioral task
behavioral1
Sample
e84e3a6b5db3f402f912a7afb328cb61.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e84e3a6b5db3f402f912a7afb328cb61.dll
Resource
win11
Behavioral task
behavioral3
Sample
e84e3a6b5db3f402f912a7afb328cb61.dll
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://08e86230e214c040f2dstzaaeww.xurvsjipiyubcsta.onion/dstzaaeww
http://08e86230e214c040f2dstzaaeww.laygive.site/dstzaaeww
http://08e86230e214c040f2dstzaaeww.loglook.club/dstzaaeww
http://08e86230e214c040f2dstzaaeww.tankmy.space/dstzaaeww
http://08e86230e214c040f2dstzaaeww.gorise.uno/dstzaaeww
Extracted
C:\Users\Admin\Documents\readme.txt
magniber
http://74c48610421492a0b8dstzaaeww.xurvsjipiyubcsta.onion/dstzaaeww
http://74c48610421492a0b8dstzaaeww.laygive.site/dstzaaeww
http://74c48610421492a0b8dstzaaeww.loglook.club/dstzaaeww
http://74c48610421492a0b8dstzaaeww.tankmy.space/dstzaaeww
http://74c48610421492a0b8dstzaaeww.gorise.uno/dstzaaeww
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://b2f092b872ec44d016dstzaaeww.xurvsjipiyubcsta.onion/dstzaaeww
http://b2f092b872ec44d016dstzaaeww.laygive.site/dstzaaeww
http://b2f092b872ec44d016dstzaaeww.loglook.club/dstzaaeww
http://b2f092b872ec44d016dstzaaeww.tankmy.space/dstzaaeww
http://b2f092b872ec44d016dstzaaeww.gorise.uno/dstzaaeww
Targets
-
-
Target
e84e3a6b5db3f402f912a7afb328cb61
-
Size
21KB
-
MD5
e84e3a6b5db3f402f912a7afb328cb61
-
SHA1
f57f4f7d2358c5b00a9a39fcdbb0d668e503dedc
-
SHA256
66c4f54da6542339de036872e80306f345b8572a71e782434245455e03541465
-
SHA512
1c60484518b489beb748641ee3983c698ed6253c63abc7818cf76e7fd76944977f1b83c7a762bd16f40945adf646b80de4058f59d775b708b276f754bbf63c91
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-