General
-
Target
bfa86847c33dfb1ece4323369a271f7a
-
Size
38KB
-
Sample
240311-devcssba31
-
MD5
bfa86847c33dfb1ece4323369a271f7a
-
SHA1
87866e440b4e9ef1039df2ce78a278f4ac22ceb1
-
SHA256
3589d019564eedff37d7fd5efbc465144ca6a991fd23fadd9191ff169fa38ef0
-
SHA512
2b0018f3be33cb984e8cebcf6ee6443883776284fba8f502cc8ac0571267aad0cc4226f85bc411e649b122ef1793f3aa0bc488abb19b5239c547553f50f68c52
-
SSDEEP
768:Vbmx6Yq3MT9sxNNEIj4v7JuYtcxRdf9Ijsg1b1pKo/OYGI:VbmDvsNE+4zJuYi3df9yLk6dd
Static task
static1
Behavioral task
behavioral1
Sample
bfa86847c33dfb1ece4323369a271f7a.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfa86847c33dfb1ece4323369a271f7a.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://182838d8a2a8b8d022genhtaat.r45ucj44wxpb2pf2kewwscy5pcpzsx6wnqsa53xhpexxazksajplfmid.onion/genhtaat
http://182838d8a2a8b8d022genhtaat.datause.monster/genhtaat
http://182838d8a2a8b8d022genhtaat.hidtook.club/genhtaat
http://182838d8a2a8b8d022genhtaat.agofair.fit/genhtaat
http://182838d8a2a8b8d022genhtaat.abeing.website/genhtaat
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://f8ec869032e4d8102agenhtaat.r45ucj44wxpb2pf2kewwscy5pcpzsx6wnqsa53xhpexxazksajplfmid.onion/genhtaat
http://f8ec869032e4d8102agenhtaat.datause.monster/genhtaat
http://f8ec869032e4d8102agenhtaat.hidtook.club/genhtaat
http://f8ec869032e4d8102agenhtaat.agofair.fit/genhtaat
http://f8ec869032e4d8102agenhtaat.abeing.website/genhtaat
Targets
-
-
Target
bfa86847c33dfb1ece4323369a271f7a
-
Size
38KB
-
MD5
bfa86847c33dfb1ece4323369a271f7a
-
SHA1
87866e440b4e9ef1039df2ce78a278f4ac22ceb1
-
SHA256
3589d019564eedff37d7fd5efbc465144ca6a991fd23fadd9191ff169fa38ef0
-
SHA512
2b0018f3be33cb984e8cebcf6ee6443883776284fba8f502cc8ac0571267aad0cc4226f85bc411e649b122ef1793f3aa0bc488abb19b5239c547553f50f68c52
-
SSDEEP
768:Vbmx6Yq3MT9sxNNEIj4v7JuYtcxRdf9Ijsg1b1pKo/OYGI:VbmDvsNE+4zJuYi3df9yLk6dd
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (54) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-