General
-
Target
009aaaf3b4f3a34b662cb9d27fb4409d
-
Size
39KB
-
Sample
231224-rqf67sdhcq
-
MD5
009aaaf3b4f3a34b662cb9d27fb4409d
-
SHA1
ac5bfd05ec67090c4f7180519628328e29f3f39a
-
SHA256
2b474cca6c5ff5e1d435d91694b4436876901e3be9c63c3a1d76ff3dbc432017
-
SHA512
50973c3ac2849c8664d74d7efc07fcb0a43260d05030fa7772f135cf716357d522309e70d7ba4ee51cd44ea7a3c711b321221b33ab192ccce6ee71dceb527aea
-
SSDEEP
768:QJvL0rvzhHm06R0Zd+01mV0kgMazfo269xnWf77/KrkVPe4kQKNNJ7kIGsp9C88K:q0rvzhV6Ra+01Y0dMio39xWDrKrkVm4i
Static task
static1
Behavioral task
behavioral1
Sample
009aaaf3b4f3a34b662cb9d27fb4409d.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
009aaaf3b4f3a34b662cb9d27fb4409d.dll
Resource
win10v2004-20231222-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://2a4422984c4c6cb052sgokwyejx.yeipgu36oui5z4yvck5w6d252oo3h7ktcsxvs3m2wac6ezmti2iotzad.onion/sgokwyejx
http://2a4422984c4c6cb052sgokwyejx.actmake.site/sgokwyejx
http://2a4422984c4c6cb052sgokwyejx.bearsat.space/sgokwyejx
http://2a4422984c4c6cb052sgokwyejx.mixedon.xyz/sgokwyejx
http://2a4422984c4c6cb052sgokwyejx.spiteor.space/sgokwyejx
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://24e870181848369088sgokwyejx.yeipgu36oui5z4yvck5w6d252oo3h7ktcsxvs3m2wac6ezmti2iotzad.onion/sgokwyejx
http://24e870181848369088sgokwyejx.actmake.site/sgokwyejx
http://24e870181848369088sgokwyejx.bearsat.space/sgokwyejx
http://24e870181848369088sgokwyejx.mixedon.xyz/sgokwyejx
http://24e870181848369088sgokwyejx.spiteor.space/sgokwyejx
Targets
-
-
Target
009aaaf3b4f3a34b662cb9d27fb4409d
-
Size
39KB
-
MD5
009aaaf3b4f3a34b662cb9d27fb4409d
-
SHA1
ac5bfd05ec67090c4f7180519628328e29f3f39a
-
SHA256
2b474cca6c5ff5e1d435d91694b4436876901e3be9c63c3a1d76ff3dbc432017
-
SHA512
50973c3ac2849c8664d74d7efc07fcb0a43260d05030fa7772f135cf716357d522309e70d7ba4ee51cd44ea7a3c711b321221b33ab192ccce6ee71dceb527aea
-
SSDEEP
768:QJvL0rvzhHm06R0Zd+01mV0kgMazfo269xnWf77/KrkVPe4kQKNNJ7kIGsp9C88K:q0rvzhV6Ra+01Y0dMio39xWDrKrkVm4i
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (95) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-