General
-
Target
aa07b96ab22c192c74f703b5df686c0e
-
Size
38KB
-
Sample
240227-yn9t3aac7t
-
MD5
aa07b96ab22c192c74f703b5df686c0e
-
SHA1
127443fe311a7f4d6a6823ebceee705865d9a14f
-
SHA256
7ceec3030c119c0b32adf031494a95eaa53d74205a1db89788ad5ced0220af4f
-
SHA512
aef837180cd8aa69426fbbd530b27dd6630f8f2cc1b3a1b84a55aab335df44fb8ef54a5f5bb1a82663e29b034eaf7204a8adfa818edfe1525bd1b2c5c3fcee98
-
SSDEEP
768:RjWwU9acnUuAMU24OIPDG02NLMCaYr/Dwy2ycKi/+hw:RS7kcTfmGhNAFOsjKi+
Static task
static1
Behavioral task
behavioral1
Sample
aa07b96ab22c192c74f703b5df686c0e.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa07b96ab22c192c74f703b5df686c0e.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt婍
http://103c22302aa4f8e050gtpiaqekj.ntjflrx6uhwcmfhnn3yewv2wfhtqtjyfkvyrvjz4wuo6uw33yw7sfiid.onion/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.bitslet.uno/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.flymet.club/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.canyour.xyz/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.dogper.space/gtpiaqekj
Extracted
C:\Users\Admin\Music\readme.txt
magniber
http://103c22302aa4f8e050gtpiaqekj.ntjflrx6uhwcmfhnn3yewv2wfhtqtjyfkvyrvjz4wuo6uw33yw7sfiid.onion/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.bitslet.uno/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.flymet.club/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.canyour.xyz/gtpiaqekj
http://103c22302aa4f8e050gtpiaqekj.dogper.space/gtpiaqekj
Targets
-
-
Target
aa07b96ab22c192c74f703b5df686c0e
-
Size
38KB
-
MD5
aa07b96ab22c192c74f703b5df686c0e
-
SHA1
127443fe311a7f4d6a6823ebceee705865d9a14f
-
SHA256
7ceec3030c119c0b32adf031494a95eaa53d74205a1db89788ad5ced0220af4f
-
SHA512
aef837180cd8aa69426fbbd530b27dd6630f8f2cc1b3a1b84a55aab335df44fb8ef54a5f5bb1a82663e29b034eaf7204a8adfa818edfe1525bd1b2c5c3fcee98
-
SSDEEP
768:RjWwU9acnUuAMU24OIPDG02NLMCaYr/Dwy2ycKi/+hw:RS7kcTfmGhNAFOsjKi+
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-