General
-
Target
2.dll
-
Size
38KB
-
Sample
210829-ezx2y7snl2
-
MD5
af93e6f3ae4466cefe7aa27baedfec96
-
SHA1
b6dc065d489b104c9aa08aacc6f97dd0b672d907
-
SHA256
5cfd8fefb03c8b0417743f48b9c8ac041387b9f0d24e775d0917a4c7de41847d
-
SHA512
43273b952f19d77499b5fce4f0c937e71017c56c133991832a1fa2a39151790e9161f794e4ea07776dc5a291f5c1d8a8d98b9c9ddcdce4c84a4de50346d1eef2
Static task
static1
Behavioral task
behavioral1
Sample
2.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2.dll
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://feb8c46022607eb03hramozl.755w262jegubyu4txxdvjupbul2uelswocczig2rw6ex2fhbguvlkfyd.onion/hramozl
http://feb8c46022607eb03hramozl.centone.top/hramozl
http://feb8c46022607eb03hramozl.burybig.xyz/hramozl
http://feb8c46022607eb03hramozl.dumpour.space/hramozl
http://feb8c46022607eb03hramozl.joyfits.site/hramozl
Targets
-
-
Target
2.dll
-
Size
38KB
-
MD5
af93e6f3ae4466cefe7aa27baedfec96
-
SHA1
b6dc065d489b104c9aa08aacc6f97dd0b672d907
-
SHA256
5cfd8fefb03c8b0417743f48b9c8ac041387b9f0d24e775d0917a4c7de41847d
-
SHA512
43273b952f19d77499b5fce4f0c937e71017c56c133991832a1fa2a39151790e9161f794e4ea07776dc5a291f5c1d8a8d98b9c9ddcdce4c84a4de50346d1eef2
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-