General
-
Target
dd6d5b77ea31de026c8bfb867f14ed70
-
Size
38KB
-
Sample
231220-s8za6secc8
-
MD5
dd6d5b77ea31de026c8bfb867f14ed70
-
SHA1
7865af12c34f87e095ff70812eb753cf3f944449
-
SHA256
553e833cf333ad707a9aa18e01f6d9d4fca8935b92f15c5ddfee379eabcb9efa
-
SHA512
45f361bd370f83d07de54f21ea1beacca8fe98e12a1051f37dc8e690481675d838620d3a2cca107007981b30795afe2240de0ffff58dc3265d8e259c0fe6b220
-
SSDEEP
768:tpB71V2b/CK1xbFHq4VPQz+oNOOs792CZ9xJS/DR1snrFqJknw/Agw:B1S/CMbFrVPQCoDC2CbxO91qrFqSnw4g
Static task
static1
Behavioral task
behavioral1
Sample
dd6d5b77ea31de026c8bfb867f14ed70.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
dd6d5b77ea31de026c8bfb867f14ed70.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://0490ce38e86452609fjqzqma.r4vwwgioac7x2ftfglttr7qst265edv6rhmsdmjdgt6wxzuhgx4ynfid.onion/fjqzqma
http://0490ce38e86452609fjqzqma.phoneis.website/fjqzqma
http://0490ce38e86452609fjqzqma.donehim.space/fjqzqma
http://0490ce38e86452609fjqzqma.lessmod.quest/fjqzqma
http://0490ce38e86452609fjqzqma.fixkeys.top/fjqzqma
Targets
-
-
Target
dd6d5b77ea31de026c8bfb867f14ed70
-
Size
38KB
-
MD5
dd6d5b77ea31de026c8bfb867f14ed70
-
SHA1
7865af12c34f87e095ff70812eb753cf3f944449
-
SHA256
553e833cf333ad707a9aa18e01f6d9d4fca8935b92f15c5ddfee379eabcb9efa
-
SHA512
45f361bd370f83d07de54f21ea1beacca8fe98e12a1051f37dc8e690481675d838620d3a2cca107007981b30795afe2240de0ffff58dc3265d8e259c0fe6b220
-
SSDEEP
768:tpB71V2b/CK1xbFHq4VPQz+oNOOs792CZ9xJS/DR1snrFqJknw/Agw:B1S/CMbFrVPQCoDC2CbxO91qrFqSnw4g
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-