General
-
Target
c5f402a197a5b61d5b08d2602eb6d4a8
-
Size
38KB
-
Sample
211104-htx5fsdben
-
MD5
c5f402a197a5b61d5b08d2602eb6d4a8
-
SHA1
5e5203f0376a5f9665430ae6d9f2240f68b15e2c
-
SHA256
5ce6fca6bd23161542ac33294ea2135c9278acee6a13c69028f81ca71beecebe
-
SHA512
74e03a6db63ca2969bdc538a426be1da4680f2c3acfa5737d1f8602e6bfe088600bd6252911896106edc3e28ed1a6f4040a3a172952c1bcf144fd7b2efdfe0c6
Static task
static1
Behavioral task
behavioral1
Sample
c5f402a197a5b61d5b08d2602eb6d4a8.dll
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
c5f402a197a5b61d5b08d2602eb6d4a8.dll
Resource
win10-en-20211014
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://54ac6090a47ca27032koxinsnc.d7h33stfpbhrhq7k4oybqe5nw2f3ne5iukuq5lyirwbkhi52pb6hzrad.onion/koxinsnc
http://54ac6090a47ca27032koxinsnc.bookrow.website/koxinsnc
http://54ac6090a47ca27032koxinsnc.letsyou.uno/koxinsnc
http://54ac6090a47ca27032koxinsnc.bankhid.space/koxinsnc
http://54ac6090a47ca27032koxinsnc.twosat.fit/koxinsnc
Targets
-
-
Target
c5f402a197a5b61d5b08d2602eb6d4a8
-
Size
38KB
-
MD5
c5f402a197a5b61d5b08d2602eb6d4a8
-
SHA1
5e5203f0376a5f9665430ae6d9f2240f68b15e2c
-
SHA256
5ce6fca6bd23161542ac33294ea2135c9278acee6a13c69028f81ca71beecebe
-
SHA512
74e03a6db63ca2969bdc538a426be1da4680f2c3acfa5737d1f8602e6bfe088600bd6252911896106edc3e28ed1a6f4040a3a172952c1bcf144fd7b2efdfe0c6
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-