General
-
Target
Magniber2.msi
-
Size
10.6MB
-
Sample
220630-eagrksheb9
-
MD5
cb152752867af105819552b9086a8c76
-
SHA1
f8cd1daef2428e9c01af3e1352e694c2f48d6cdf
-
SHA256
fd5979d5ad2b2d68d7e5508c2d4e0147241e379a9115c0771d8bb56e2692db8c
-
SHA512
9bcfa1f55d329149b1025dfd68ac3c5045a764427723d1b7b1e690bf973c99756865a0cfbf7dce17a83552562c3c193fb75bdda8b6f7550a6d24297cdf670f81
Static task
static1
Behavioral task
behavioral1
Sample
Magniber2.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Magniber2.msi
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Magniber2.msi
-
Size
10.6MB
-
MD5
cb152752867af105819552b9086a8c76
-
SHA1
f8cd1daef2428e9c01af3e1352e694c2f48d6cdf
-
SHA256
fd5979d5ad2b2d68d7e5508c2d4e0147241e379a9115c0771d8bb56e2692db8c
-
SHA512
9bcfa1f55d329149b1025dfd68ac3c5045a764427723d1b7b1e690bf973c99756865a0cfbf7dce17a83552562c3c193fb75bdda8b6f7550a6d24297cdf670f81
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Modifies boot configuration data using bcdedit
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-