General
-
Target
3088d9d808dd030a756633437f351b13
-
Size
33KB
-
Sample
231225-vxqwrsfag9
-
MD5
3088d9d808dd030a756633437f351b13
-
SHA1
a4e78428c7aa5f14681a313fd3f92c9267e9469a
-
SHA256
9209b297a4d3af1a82e4a60fa45fa558f08a502ebcf5dc2fa487505fd72be331
-
SHA512
2db4cc645b040f5e5e73d61db8342b40b5fd592ad96b5187d8513e5fd6864da6306ebc887b58df7ebf94f00aac703a3acfe30e326bd9bf7eec49a27276d75b70
-
SSDEEP
768:JxnHytUcpkucln36De22PJNFai4OLS5wz3YKUt4fSsDZ:J0DkVV6Dh2dHrdzrbNZ
Static task
static1
Behavioral task
behavioral1
Sample
3088d9d808dd030a756633437f351b13.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3088d9d808dd030a756633437f351b13.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt婍
http://70b064b89cc49020e6emkyhecy.yeipgu36oui5z4yvck5w6d252oo3h7ktcsxvs3m2wac6ezmti2iotzad.onion/emkyhecy
http://70b064b89cc49020e6emkyhecy.mixedon.xyz/emkyhecy
http://70b064b89cc49020e6emkyhecy.actmake.site/emkyhecy
http://70b064b89cc49020e6emkyhecy.spiteor.space/emkyhecy
http://70b064b89cc49020e6emkyhecy.bearsat.space/emkyhecy
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://7278d0001c94b63022emkyhecy.yeipgu36oui5z4yvck5w6d252oo3h7ktcsxvs3m2wac6ezmti2iotzad.onion/emkyhecy
http://7278d0001c94b63022emkyhecy.mixedon.xyz/emkyhecy
http://7278d0001c94b63022emkyhecy.actmake.site/emkyhecy
http://7278d0001c94b63022emkyhecy.spiteor.space/emkyhecy
http://7278d0001c94b63022emkyhecy.bearsat.space/emkyhecy
Targets
-
-
Target
3088d9d808dd030a756633437f351b13
-
Size
33KB
-
MD5
3088d9d808dd030a756633437f351b13
-
SHA1
a4e78428c7aa5f14681a313fd3f92c9267e9469a
-
SHA256
9209b297a4d3af1a82e4a60fa45fa558f08a502ebcf5dc2fa487505fd72be331
-
SHA512
2db4cc645b040f5e5e73d61db8342b40b5fd592ad96b5187d8513e5fd6864da6306ebc887b58df7ebf94f00aac703a3acfe30e326bd9bf7eec49a27276d75b70
-
SSDEEP
768:JxnHytUcpkucln36De22PJNFai4OLS5wz3YKUt4fSsDZ:J0DkVV6Dh2dHrdzrbNZ
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (66) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-