General

  • Target

    Magniber11.msi

  • Size

    11.4MB

  • Sample

    220627-rgpf8adfa5

  • MD5

    43db7b2265449e9e7fbe92cf64489312

  • SHA1

    d5b15d33a6406c603622f4bf98729f63c71c7933

  • SHA256

    b9669bea10051a80e268a97e455404a0f50c310ed92d26965d8b097429c0adcf

  • SHA512

    a9751360b4ca881fa2b621832222f74d4482a5295522dc8367b73bae0fd5712edd26eea4d02b4407b884a2a89bc77cb941e6daaaa00d37a9c73cc352bb0b2eb3

Malware Config

Targets

    • Target

      Magniber11.msi

    • Size

      11.4MB

    • MD5

      43db7b2265449e9e7fbe92cf64489312

    • SHA1

      d5b15d33a6406c603622f4bf98729f63c71c7933

    • SHA256

      b9669bea10051a80e268a97e455404a0f50c310ed92d26965d8b097429c0adcf

    • SHA512

      a9751360b4ca881fa2b621832222f74d4482a5295522dc8367b73bae0fd5712edd26eea4d02b4407b884a2a89bc77cb941e6daaaa00d37a9c73cc352bb0b2eb3

    • Detect magniber ransomware

    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Modifies boot configuration data using bcdedit

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks