General
-
Target
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.zip
-
Size
19KB
-
Sample
211121-2zkwvseeep
-
MD5
ef3f935d15d52da40329b5942170ff6c
-
SHA1
b372392215a9675fa9c094671bf88abb2d4fd06b
-
SHA256
28ad429c96fc5f49934a35ebe13f6d78b752829d30efaea5485ac1f2dcb1d0bc
-
SHA512
9c1a1f97e50d999f774b248f5d30a726881eca62a86efc8e3a7546e60ecd2d977e04f996509778ef290fe4fdbd4dda9c265c215501c040bd99e3d05b64e25b23
Static task
static1
Behavioral task
behavioral1
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
Resource
win10-en-20211014
Malware Config
Extracted
C:\Users\Admin\Desktop\readme.txt
magniber
http://0e44d2d8c87ca2701celtalkfzj.n5fnrf4l7bdjhelx.onion/eltalkfzj
http://0e44d2d8c87ca2701celtalkfzj.jobsbig.cam/eltalkfzj
http://0e44d2d8c87ca2701celtalkfzj.boxgas.icu/eltalkfzj
http://0e44d2d8c87ca2701celtalkfzj.sixsees.club/eltalkfzj
http://0e44d2d8c87ca2701celtalkfzj.nowuser.casa/eltalkfzj
Targets
-
-
Target
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367.exe
-
Size
22KB
-
MD5
7906dc475a8ae55ffb5af7fd3ac8f10a
-
SHA1
e7304e2436dc0eddddba229f1ec7145055030151
-
SHA256
1814a6a6749684cdacd792374e0ba31b7be4ff6f9675f3fd15d543afbb540367
-
SHA512
c087b3107295095e9aca527d02b74c067e96ca5daf5457e465f8606dbf4809027faedf65d77868f6fb8bb91a1438e3d0169e59efddf1439bbd3adb3e23a739a1
Score10/10-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-