General
-
Target
7b598815af2522938f6bc3fb53010cc0
-
Size
38KB
-
Sample
231222-jvbhhscgaj
-
MD5
7b598815af2522938f6bc3fb53010cc0
-
SHA1
76b6d116179c3cd38f1b715fe1778290eb87c676
-
SHA256
fd4a482cc2d1469c31a4bed466d4acf717ecaa83af1abd677198d254ee25bf22
-
SHA512
5e3fe2689dd31b1c488256f332c829bab3e97ba89fba020a423130af13657e21341514d38f7cc33a636e47fb07294083d351d09c7887c4792fc0f1026523210a
-
SSDEEP
768:B51I4cnvHkMeaEIwCrbjvkTlmx3El3xF00ydemHlTfLIt3GeMdE:31Ix/eaZwCXjvY5/F7ygmRfLIt3GFE
Static task
static1
Behavioral task
behavioral1
Sample
7b598815af2522938f6bc3fb53010cc0.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7b598815af2522938f6bc3fb53010cc0.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://f86400602a20fa609ddihwvy.ypajgycpauisibmmq6en2xd6z6doiiwxitzhwbu2zmxfxwjcumvirbad.onion/ddihwvy
http://f86400602a20fa609ddihwvy.outwest.top/ddihwvy
http://f86400602a20fa609ddihwvy.coldsum.space/ddihwvy
http://f86400602a20fa609ddihwvy.datesat.site/ddihwvy
http://f86400602a20fa609ddihwvy.outplea.xyz/ddihwvy
Targets
-
-
Target
7b598815af2522938f6bc3fb53010cc0
-
Size
38KB
-
MD5
7b598815af2522938f6bc3fb53010cc0
-
SHA1
76b6d116179c3cd38f1b715fe1778290eb87c676
-
SHA256
fd4a482cc2d1469c31a4bed466d4acf717ecaa83af1abd677198d254ee25bf22
-
SHA512
5e3fe2689dd31b1c488256f332c829bab3e97ba89fba020a423130af13657e21341514d38f7cc33a636e47fb07294083d351d09c7887c4792fc0f1026523210a
-
SSDEEP
768:B51I4cnvHkMeaEIwCrbjvkTlmx3El3xF00ydemHlTfLIt3GeMdE:31Ix/eaZwCXjvY5/F7ygmRfLIt3GFE
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-