General
-
Target
66e5ba1f28fd8c2bd5b1d7374c3da559
-
Size
38KB
-
Sample
211108-3sdpmsedb2
-
MD5
66e5ba1f28fd8c2bd5b1d7374c3da559
-
SHA1
6aba0f311c91ddd9c803641d45b999c5dc4d5c89
-
SHA256
f89425aa13ac58d54c13838db27b6adb2a03a427b801fe1c7842c48a5e05c348
-
SHA512
0d51a5c979d3e7bfe3a884c33691462b5893d934b7a6bc91fe0c6f1bf4347532f7350c190946e823e86098f38674124e5f2f71d94064b7a405431881d65efea8
Static task
static1
Behavioral task
behavioral1
Sample
66e5ba1f28fd8c2bd5b1d7374c3da559.dll
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
66e5ba1f28fd8c2bd5b1d7374c3da559.dll
Resource
win10-en-20211104
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://3818c430422cd6803amqvhpqvv.vyewxn2lkxrihikeunagqqoakralogk5ze5vaxrkahvkjdug6rcwdsqd.onion/mqvhpqvv
http://3818c430422cd6803amqvhpqvv.oddson.quest/mqvhpqvv
http://3818c430422cd6803amqvhpqvv.dearbet.sbs/mqvhpqvv
http://3818c430422cd6803amqvhpqvv.hateme.uno/mqvhpqvv
http://3818c430422cd6803amqvhpqvv.legcore.space/mqvhpqvv
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://b00cfee080f46e1050mqvhpqvv.vyewxn2lkxrihikeunagqqoakralogk5ze5vaxrkahvkjdug6rcwdsqd.onion/mqvhpqvv
http://b00cfee080f46e1050mqvhpqvv.oddson.quest/mqvhpqvv
http://b00cfee080f46e1050mqvhpqvv.dearbet.sbs/mqvhpqvv
http://b00cfee080f46e1050mqvhpqvv.hateme.uno/mqvhpqvv
http://b00cfee080f46e1050mqvhpqvv.legcore.space/mqvhpqvv
Targets
-
-
Target
66e5ba1f28fd8c2bd5b1d7374c3da559
-
Size
38KB
-
MD5
66e5ba1f28fd8c2bd5b1d7374c3da559
-
SHA1
6aba0f311c91ddd9c803641d45b999c5dc4d5c89
-
SHA256
f89425aa13ac58d54c13838db27b6adb2a03a427b801fe1c7842c48a5e05c348
-
SHA512
0d51a5c979d3e7bfe3a884c33691462b5893d934b7a6bc91fe0c6f1bf4347532f7350c190946e823e86098f38674124e5f2f71d94064b7a405431881d65efea8
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-