General
-
Target
4a85c4bd950cd5034a5a06ad9f77c08c
-
Size
38KB
-
Sample
231222-b5nltsfge9
-
MD5
4a85c4bd950cd5034a5a06ad9f77c08c
-
SHA1
c95573edb69411a4aeb106567d04c4871c46c7eb
-
SHA256
652e1eac5b19ff783f453fbca0afcabd7ede53dac6eec6e1d35cbad346078f90
-
SHA512
9c84dc894351798c69faf92e6ca93b2174ac0fad9df05b2dd63154347b9c750339d317f261ef4ef541334a8ef8ce5a80ff5be1f9e58908a11373778b7ab7b6e9
-
SSDEEP
768:vDjer4oprwpTVpy4Th3ev7o6i0W6njYqnOU7ieRt7HGNwvzl8:XerBwNVQ4Qdi0djZnOU7i2t7HGKJ
Static task
static1
Behavioral task
behavioral1
Sample
4a85c4bd950cd5034a5a06ad9f77c08c.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a85c4bd950cd5034a5a06ad9f77c08c.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt婍
http://66c4688056c4902034exvjphh.7ckkscprdlxe7vtmcdbsj2xln65hob6etvwpo3hatwee34if67nrqrad.onion/exvjphh
http://66c4688056c4902034exvjphh.wanttwo.site/exvjphh
http://66c4688056c4902034exvjphh.holdleg.space/exvjphh
http://66c4688056c4902034exvjphh.hidmove.xyz/exvjphh
http://66c4688056c4902034exvjphh.sleepso.top/exvjphh
Targets
-
-
Target
4a85c4bd950cd5034a5a06ad9f77c08c
-
Size
38KB
-
MD5
4a85c4bd950cd5034a5a06ad9f77c08c
-
SHA1
c95573edb69411a4aeb106567d04c4871c46c7eb
-
SHA256
652e1eac5b19ff783f453fbca0afcabd7ede53dac6eec6e1d35cbad346078f90
-
SHA512
9c84dc894351798c69faf92e6ca93b2174ac0fad9df05b2dd63154347b9c750339d317f261ef4ef541334a8ef8ce5a80ff5be1f9e58908a11373778b7ab7b6e9
-
SSDEEP
768:vDjer4oprwpTVpy4Th3ev7o6i0W6njYqnOU7ieRt7HGNwvzl8:XerBwNVQ4Qdi0djZnOU7i2t7HGKJ
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (62) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-