General
-
Target
078fc91a424af8bd2c7ba72ed1e1c9087e934d1f43dd1af73ba046b1f7aa3a82.exe
-
Size
38KB
-
Sample
210923-d5pv1aeda9
-
MD5
430d9d3ac7255158ee1fe64450fcb205
-
SHA1
3716cf72910d6576e55db3286a19586a2f919de7
-
SHA256
078fc91a424af8bd2c7ba72ed1e1c9087e934d1f43dd1af73ba046b1f7aa3a82
-
SHA512
84eda5e4a1b1b6c5633915e9de29aaa70827f33e74b83317e2310bf5a13a79e1170f80736a14147587fd109e5e465b0739b9823af15b4ea3903b38a4c7764350
Static task
static1
Behavioral task
behavioral1
Sample
078fc91a424af8bd2c7ba72ed1e1c9087e934d1f43dd1af73ba046b1f7aa3a82.exe.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
078fc91a424af8bd2c7ba72ed1e1c9087e934d1f43dd1af73ba046b1f7aa3a82.exe.dll
Resource
win10-en-20210920
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://782cfe3862607e40ejmaczdsbx.auybyleuz2avqvmddfc7qevow5qg5naejwsiqesxa2rvqq6w6quyzvid.onion/jmaczdsbx
http://782cfe3862607e40ejmaczdsbx.runpoor.space/jmaczdsbx
http://782cfe3862607e40ejmaczdsbx.dealhis.xyz/jmaczdsbx
http://782cfe3862607e40ejmaczdsbx.bugtill.top/jmaczdsbx
http://782cfe3862607e40ejmaczdsbx.soldmet.site/jmaczdsbx
Targets
-
-
Target
078fc91a424af8bd2c7ba72ed1e1c9087e934d1f43dd1af73ba046b1f7aa3a82.exe
-
Size
38KB
-
MD5
430d9d3ac7255158ee1fe64450fcb205
-
SHA1
3716cf72910d6576e55db3286a19586a2f919de7
-
SHA256
078fc91a424af8bd2c7ba72ed1e1c9087e934d1f43dd1af73ba046b1f7aa3a82
-
SHA512
84eda5e4a1b1b6c5633915e9de29aaa70827f33e74b83317e2310bf5a13a79e1170f80736a14147587fd109e5e465b0739b9823af15b4ea3903b38a4c7764350
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of SetThreadContext
-