General
-
Target
53e5fc2375ca90b7345c7533aa34e7cb
-
Size
38KB
-
Sample
231222-c3lvwsgeeq
-
MD5
53e5fc2375ca90b7345c7533aa34e7cb
-
SHA1
e52901f32031dea26e087ea28a22b11324fe2616
-
SHA256
5642ad44f0697e5c7d1c09a862bc32bd0e7da73e8ed717899b111fe5ce61a713
-
SHA512
9512625afdc6f9547af0bd5d47661c2f3cf2cac7abec50393b906bfc9b01ea7878260db49a41cb69c1aadbac65cd38b203faa94e0cfb51e40dcb7e6c801b9fb4
-
SSDEEP
768:fESk4VQoQCC3cHHrnZOVSJbNZoMzODqY3PnwZDZe7nmoot9kq3W33WuZEcSfuC:fDk1RCCMHVOeH3OvwZF+nct9kqGHWuYp
Static task
static1
Behavioral task
behavioral1
Sample
53e5fc2375ca90b7345c7533aa34e7cb.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e5fc2375ca90b7345c7533aa34e7cb.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://e04064b8ee7c56d05aowpynsoc.ypajgycpauisibmmq6en2xd6z6doiiwxitzhwbu2zmxfxwjcumvirbad.onion/owpynsoc
http://e04064b8ee7c56d05aowpynsoc.coldsum.space/owpynsoc
http://e04064b8ee7c56d05aowpynsoc.datesat.site/owpynsoc
http://e04064b8ee7c56d05aowpynsoc.outplea.xyz/owpynsoc
http://e04064b8ee7c56d05aowpynsoc.outwest.top/owpynsoc
Targets
-
-
Target
53e5fc2375ca90b7345c7533aa34e7cb
-
Size
38KB
-
MD5
53e5fc2375ca90b7345c7533aa34e7cb
-
SHA1
e52901f32031dea26e087ea28a22b11324fe2616
-
SHA256
5642ad44f0697e5c7d1c09a862bc32bd0e7da73e8ed717899b111fe5ce61a713
-
SHA512
9512625afdc6f9547af0bd5d47661c2f3cf2cac7abec50393b906bfc9b01ea7878260db49a41cb69c1aadbac65cd38b203faa94e0cfb51e40dcb7e6c801b9fb4
-
SSDEEP
768:fESk4VQoQCC3cHHrnZOVSJbNZoMzODqY3PnwZDZe7nmoot9kq3W33WuZEcSfuC:fDk1RCCMHVOeH3OvwZF+nct9kqGHWuYp
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (66) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-