General
-
Target
Magniber14.msi
-
Size
11.4MB
-
Sample
220627-rg9r6adfb2
-
MD5
578dcc9ab0d231ad315da3c568dd974a
-
SHA1
e690c686e225abbde34dbe4ff0e41bb2c93f3b53
-
SHA256
64a3d5a2d4e801efc34f17d2f32aaea3126b7f2dd9c3def16ebaa7a45486596b
-
SHA512
8a5e9476a25f4513ea047cb98a383c6b6208efa479841557eadc3fb037b024b6da40f4a18068f618a3a412bb8408b78870c26b530e95b749e3ceac84a2163bc2
Static task
static1
Behavioral task
behavioral1
Sample
Magniber14.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Magniber14.msi
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Magniber14.msi
-
Size
11.4MB
-
MD5
578dcc9ab0d231ad315da3c568dd974a
-
SHA1
e690c686e225abbde34dbe4ff0e41bb2c93f3b53
-
SHA256
64a3d5a2d4e801efc34f17d2f32aaea3126b7f2dd9c3def16ebaa7a45486596b
-
SHA512
8a5e9476a25f4513ea047cb98a383c6b6208efa479841557eadc3fb037b024b6da40f4a18068f618a3a412bb8408b78870c26b530e95b749e3ceac84a2163bc2
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies boot configuration data using bcdedit
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-