General
-
Target
cbf762fb16cfe0149b46a61f3fb029fd
-
Size
38KB
-
Sample
240315-vq5fksdh2w
-
MD5
cbf762fb16cfe0149b46a61f3fb029fd
-
SHA1
24d70407e12631bd83f39164bcd5ca6a74a0b459
-
SHA256
2cd5879589f6af26488a2c9451d279306c472302375916e34f2646e7095ce4b9
-
SHA512
e26dd9fcb24b7357da2230c87d6ee7ed59f1288118160b42d92161a42e77a91077a8a9c6b9ab49a68f6cdf7135d57be3a465190118112d1c0a49e7408b28a853
-
SSDEEP
768:tNB4vRN8egwET/AOBHR9T7lGFDZFpVNKu90lQtwPFhXB+6OPvF65IM0:5A8ugn5T7le1l1Gb+6OPvdM
Static task
static1
Behavioral task
behavioral1
Sample
cbf762fb16cfe0149b46a61f3fb029fd.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbf762fb16cfe0149b46a61f3fb029fd.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt婍
http://0894f630026cc460c8awbcrke.grv4f55lyxu36y26o4orfzy7vmwiljcruko6r7q4tatxvjugg4j66lid.onion/awbcrke
http://0894f630026cc460c8awbcrke.hegame.xyz/awbcrke
http://0894f630026cc460c8awbcrke.tietill.space/awbcrke
http://0894f630026cc460c8awbcrke.hesmust.top/awbcrke
http://0894f630026cc460c8awbcrke.salecup.club/awbcrke
Targets
-
-
Target
cbf762fb16cfe0149b46a61f3fb029fd
-
Size
38KB
-
MD5
cbf762fb16cfe0149b46a61f3fb029fd
-
SHA1
24d70407e12631bd83f39164bcd5ca6a74a0b459
-
SHA256
2cd5879589f6af26488a2c9451d279306c472302375916e34f2646e7095ce4b9
-
SHA512
e26dd9fcb24b7357da2230c87d6ee7ed59f1288118160b42d92161a42e77a91077a8a9c6b9ab49a68f6cdf7135d57be3a465190118112d1c0a49e7408b28a853
-
SSDEEP
768:tNB4vRN8egwET/AOBHR9T7lGFDZFpVNKu90lQtwPFhXB+6OPvF65IM0:5A8ugn5T7le1l1Gb+6OPvdM
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-