General
-
Target
a3e7152abd213f303c1561aa20ed9cea
-
Size
38KB
-
Sample
231227-fc7apacbcp
-
MD5
a3e7152abd213f303c1561aa20ed9cea
-
SHA1
0cfb6ac5f567c4dd3e9ebe741c2b8b0e19cb243e
-
SHA256
8ab78bc8884b9de573a3dc19e7fc206e925f643aee3f152d19e8d1caa90b6312
-
SHA512
854dad9d639cb4c9860c7dcd2d1bb7204ce3efe0a5bc0521d37a61e7ef3787a8334620d718ec2abdbbd077122c008273ce29cf1382af45d8411c431f5cf2e777
-
SSDEEP
768:bL2WWrr4WdC5pqndJgr8q39GGL3RqL9Q1VW028JQyt3uh11yCg:GdC5pqndJIHtGCE9Q1rRxIM
Static task
static1
Behavioral task
behavioral1
Sample
a3e7152abd213f303c1561aa20ed9cea.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a3e7152abd213f303c1561aa20ed9cea.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://e00810f81c0094e05asabwrkkob.grv4f55lyxu36y26o4orfzy7vmwiljcruko6r7q4tatxvjugg4j66lid.onion/sabwrkkob
http://e00810f81c0094e05asabwrkkob.hesmust.top/sabwrkkob
http://e00810f81c0094e05asabwrkkob.salecup.club/sabwrkkob
http://e00810f81c0094e05asabwrkkob.tietill.space/sabwrkkob
http://e00810f81c0094e05asabwrkkob.hegame.xyz/sabwrkkob
Targets
-
-
Target
a3e7152abd213f303c1561aa20ed9cea
-
Size
38KB
-
MD5
a3e7152abd213f303c1561aa20ed9cea
-
SHA1
0cfb6ac5f567c4dd3e9ebe741c2b8b0e19cb243e
-
SHA256
8ab78bc8884b9de573a3dc19e7fc206e925f643aee3f152d19e8d1caa90b6312
-
SHA512
854dad9d639cb4c9860c7dcd2d1bb7204ce3efe0a5bc0521d37a61e7ef3787a8334620d718ec2abdbbd077122c008273ce29cf1382af45d8411c431f5cf2e777
-
SSDEEP
768:bL2WWrr4WdC5pqndJgr8q39GGL3RqL9Q1VW028JQyt3uh11yCg:GdC5pqndJIHtGCE9Q1rRxIM
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (89) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-