General
-
Target
jrbgmq.inf
-
Size
38KB
-
Sample
211101-hthprshbe4
-
MD5
0aea8bca4799f7a2e44d4be293787d9a
-
SHA1
a957236b7c257c2bc604bb3f2b6c294b2f34691f
-
SHA256
92b8d14c0b35823e25773eb324720dfe3a285d533f5a59f93f8136280acd0e0e
-
SHA512
49f1264b3e949d4592fe55f1f2661b58d1884a78c73c22cf3883c7448455004cc4445b548f5203cca6a6927f2c008865bb82575b37554a7c0c031ad3b2e5a91e
Static task
static1
Behavioral task
behavioral1
Sample
jrbgmq.inf.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
jrbgmq.inf.dll
Resource
win10-en-20211014
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://2cd450407ef4da804erdrejjurq.3vygk5flyo5rn37gyezm5s2e57lq6e34tgr6nrhsatiuskwo3kwepiid.onion/rdrejjurq
http://2cd450407ef4da804erdrejjurq.bankhid.space/rdrejjurq
http://2cd450407ef4da804erdrejjurq.letsyou.uno/rdrejjurq
http://2cd450407ef4da804erdrejjurq.bookrow.website/rdrejjurq
http://2cd450407ef4da804erdrejjurq.twosat.fit/rdrejjurq
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://c828f61882783e40brdrejjurq.3vygk5flyo5rn37gyezm5s2e57lq6e34tgr6nrhsatiuskwo3kwepiid.onion/rdrejjurq
http://c828f61882783e40brdrejjurq.bankhid.space/rdrejjurq
http://c828f61882783e40brdrejjurq.letsyou.uno/rdrejjurq
http://c828f61882783e40brdrejjurq.bookrow.website/rdrejjurq
http://c828f61882783e40brdrejjurq.twosat.fit/rdrejjurq
Targets
-
-
Target
jrbgmq.inf
-
Size
38KB
-
MD5
0aea8bca4799f7a2e44d4be293787d9a
-
SHA1
a957236b7c257c2bc604bb3f2b6c294b2f34691f
-
SHA256
92b8d14c0b35823e25773eb324720dfe3a285d533f5a59f93f8136280acd0e0e
-
SHA512
49f1264b3e949d4592fe55f1f2661b58d1884a78c73c22cf3883c7448455004cc4445b548f5203cca6a6927f2c008865bb82575b37554a7c0c031ad3b2e5a91e
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-