General

  • Target

    adcd96c04e6729479b71004ec131f43e

  • Size

    38KB

  • Sample

    231227-macfvscfdk

  • MD5

    adcd96c04e6729479b71004ec131f43e

  • SHA1

    08699a15fec12a40a1aab8cf8073c0fc4629ecfb

  • SHA256

    598e6aa444a25c2442e321af24044fbfbf22a68843586cf058c29d5ac2b48461

  • SHA512

    2400e0246eb653d254724e539b53bedc1e0817c61d23a58d9ca72c22ce4e71c480d92462dae06af8a8626d9e49a73f458a74c3aac10a735263ea11ba3c754985

  • SSDEEP

    768:40PNWfnUqS31SdW3ZM0twjSamZjDrUim1hC3WpkqJNAhMO5zFtcAK72Rcv:4wemSdW3ZM0tc6jDw145mNAh95RtcAKa

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Pictures\readme.txt

Family

magniber

Ransom Note
ALL YOUR DOCUMENTS PHOTOS DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ==================================================================================================== Your files are NOT damaged! Your files are modified only. This modification is reversible. The only 1 way to decrypt your files is to receive the private key and decryption program. Any attempts to restore your files with the third party software will be fatal for your files! ==================================================================================================== To receive the private key and decryption program follow the instructions below: 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://364070b0500094e0cedgkqvhhrv.hy5tprdl77synlgxroueyzpat4iszkkx52r4i3ufbg6l7b32zqkyc5ad.onion/dgkqvhhrv Note! This page is available via "Tor Browser" only. ==================================================================================================== Also you can use temporary addresses on your personal page without using "Tor Browser": http://364070b0500094e0cedgkqvhhrv.metthe.top/dgkqvhhrv http://364070b0500094e0cedgkqvhhrv.sameleg.site/dgkqvhhrv http://364070b0500094e0cedgkqvhhrv.keystwo.uno/dgkqvhhrv http://364070b0500094e0cedgkqvhhrv.iflook.club/dgkqvhhrv Note! These are temporary addresses! They will be available for a limited amount of time!
URLs

http://364070b0500094e0cedgkqvhhrv.hy5tprdl77synlgxroueyzpat4iszkkx52r4i3ufbg6l7b32zqkyc5ad.onion/dgkqvhhrv

http://364070b0500094e0cedgkqvhhrv.metthe.top/dgkqvhhrv

http://364070b0500094e0cedgkqvhhrv.sameleg.site/dgkqvhhrv

http://364070b0500094e0cedgkqvhhrv.keystwo.uno/dgkqvhhrv

http://364070b0500094e0cedgkqvhhrv.iflook.club/dgkqvhhrv

Targets

    • Target

      adcd96c04e6729479b71004ec131f43e

    • Size

      38KB

    • MD5

      adcd96c04e6729479b71004ec131f43e

    • SHA1

      08699a15fec12a40a1aab8cf8073c0fc4629ecfb

    • SHA256

      598e6aa444a25c2442e321af24044fbfbf22a68843586cf058c29d5ac2b48461

    • SHA512

      2400e0246eb653d254724e539b53bedc1e0817c61d23a58d9ca72c22ce4e71c480d92462dae06af8a8626d9e49a73f458a74c3aac10a735263ea11ba3c754985

    • SSDEEP

      768:40PNWfnUqS31SdW3ZM0twjSamZjDrUim1hC3WpkqJNAhMO5zFtcAK72Rcv:4wemSdW3ZM0tc6jDw145mNAh95RtcAKa

    Score
    10/10
    • Detect magniber ransomware

    • Magniber Ransomware

      Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks