General
-
Target
cd711f77c71b93a29494bba27afebb32
-
Size
38KB
-
Sample
240316-h12ffsgc35
-
MD5
cd711f77c71b93a29494bba27afebb32
-
SHA1
a0d84f184191454e90d4bb2b7df52f8428a3b387
-
SHA256
4bf92967b0d2aabec0cb16f3c3792e714857db3e41ad5768e3493780b9342465
-
SHA512
5ad95f1fd3365a51d6438f054ecc7b849a3ef8197592403504e227402629b7b482e403e652aa0da36c7dd4f6733351639497c1de6d58df51876b906d7b261bec
-
SSDEEP
768:e04Jtvq/PbXsmSh5Mj13C05bRUSMI2mpKghGR5ZL4Z/DtChqYWrYBZF:MJtvupS/Mj13CAUTI2mpF85ZcZ/JSN
Static task
static1
Behavioral task
behavioral1
Sample
cd711f77c71b93a29494bba27afebb32.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd711f77c71b93a29494bba27afebb32.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://6064f8e844d84a50aokdpgmu.hy5tprdl77synlgxroueyzpat4iszkkx52r4i3ufbg6l7b32zqkyc5ad.onion/okdpgmu
http://6064f8e844d84a50aokdpgmu.iflook.club/okdpgmu
http://6064f8e844d84a50aokdpgmu.metthe.top/okdpgmu
http://6064f8e844d84a50aokdpgmu.keystwo.uno/okdpgmu
http://6064f8e844d84a50aokdpgmu.sameleg.site/okdpgmu
Targets
-
-
Target
cd711f77c71b93a29494bba27afebb32
-
Size
38KB
-
MD5
cd711f77c71b93a29494bba27afebb32
-
SHA1
a0d84f184191454e90d4bb2b7df52f8428a3b387
-
SHA256
4bf92967b0d2aabec0cb16f3c3792e714857db3e41ad5768e3493780b9342465
-
SHA512
5ad95f1fd3365a51d6438f054ecc7b849a3ef8197592403504e227402629b7b482e403e652aa0da36c7dd4f6733351639497c1de6d58df51876b906d7b261bec
-
SSDEEP
768:e04Jtvq/PbXsmSh5Mj13C05bRUSMI2mpKghGR5ZL4Z/DtChqYWrYBZF:MJtvupS/Mj13CAUTI2mpF85ZcZ/JSN
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (64) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-