General
-
Target
3088d9d808dd030a756633437f351b13
-
Size
33KB
-
Sample
231231-k9bbqsbde9
-
MD5
3088d9d808dd030a756633437f351b13
-
SHA1
a4e78428c7aa5f14681a313fd3f92c9267e9469a
-
SHA256
9209b297a4d3af1a82e4a60fa45fa558f08a502ebcf5dc2fa487505fd72be331
-
SHA512
2db4cc645b040f5e5e73d61db8342b40b5fd592ad96b5187d8513e5fd6864da6306ebc887b58df7ebf94f00aac703a3acfe30e326bd9bf7eec49a27276d75b70
-
SSDEEP
768:JxnHytUcpkucln36De22PJNFai4OLS5wz3YKUt4fSsDZ:J0DkVV6Dh2dHrdzrbNZ
Static task
static1
Behavioral task
behavioral1
Sample
3088d9d808dd030a756633437f351b13.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3088d9d808dd030a756633437f351b13.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt婍
http://70fcec8880c066a01eemkyhecy.yeipgu36oui5z4yvck5w6d252oo3h7ktcsxvs3m2wac6ezmti2iotzad.onion/emkyhecy
http://70fcec8880c066a01eemkyhecy.mixedon.xyz/emkyhecy
http://70fcec8880c066a01eemkyhecy.actmake.site/emkyhecy
http://70fcec8880c066a01eemkyhecy.spiteor.space/emkyhecy
http://70fcec8880c066a01eemkyhecy.bearsat.space/emkyhecy
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://2898fa80668c10504emkyhecy.yeipgu36oui5z4yvck5w6d252oo3h7ktcsxvs3m2wac6ezmti2iotzad.onion/emkyhecy
http://2898fa80668c10504emkyhecy.mixedon.xyz/emkyhecy
http://2898fa80668c10504emkyhecy.actmake.site/emkyhecy
http://2898fa80668c10504emkyhecy.spiteor.space/emkyhecy
http://2898fa80668c10504emkyhecy.bearsat.space/emkyhecy
Targets
-
-
Target
3088d9d808dd030a756633437f351b13
-
Size
33KB
-
MD5
3088d9d808dd030a756633437f351b13
-
SHA1
a4e78428c7aa5f14681a313fd3f92c9267e9469a
-
SHA256
9209b297a4d3af1a82e4a60fa45fa558f08a502ebcf5dc2fa487505fd72be331
-
SHA512
2db4cc645b040f5e5e73d61db8342b40b5fd592ad96b5187d8513e5fd6864da6306ebc887b58df7ebf94f00aac703a3acfe30e326bd9bf7eec49a27276d75b70
-
SSDEEP
768:JxnHytUcpkucln36De22PJNFai4OLS5wz3YKUt4fSsDZ:J0DkVV6Dh2dHrdzrbNZ
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-