General
-
Target
Magniber11.msi
-
Size
11.4MB
-
Sample
220627-rgpf8adfa5
-
MD5
43db7b2265449e9e7fbe92cf64489312
-
SHA1
d5b15d33a6406c603622f4bf98729f63c71c7933
-
SHA256
b9669bea10051a80e268a97e455404a0f50c310ed92d26965d8b097429c0adcf
-
SHA512
a9751360b4ca881fa2b621832222f74d4482a5295522dc8367b73bae0fd5712edd26eea4d02b4407b884a2a89bc77cb941e6daaaa00d37a9c73cc352bb0b2eb3
Static task
static1
Behavioral task
behavioral1
Sample
Magniber11.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Magniber11.msi
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Magniber11.msi
-
Size
11.4MB
-
MD5
43db7b2265449e9e7fbe92cf64489312
-
SHA1
d5b15d33a6406c603622f4bf98729f63c71c7933
-
SHA256
b9669bea10051a80e268a97e455404a0f50c310ed92d26965d8b097429c0adcf
-
SHA512
a9751360b4ca881fa2b621832222f74d4482a5295522dc8367b73bae0fd5712edd26eea4d02b4407b884a2a89bc77cb941e6daaaa00d37a9c73cc352bb0b2eb3
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies boot configuration data using bcdedit
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-