General
-
Target
db6e1b6448189f395724004a5465ce8c
-
Size
38KB
-
Sample
240321-msp5nsbb8v
-
MD5
db6e1b6448189f395724004a5465ce8c
-
SHA1
96ae8d941c0f4a4f57e0c2e621ee57e82ccd88e4
-
SHA256
c7d0dd48bc5c3d78570fa583b6c05ec65202c6abb9d6bcf1a1bb7c5d5b74e091
-
SHA512
330f7b442764c93f9e972c95ac68dffce44a58fc0c56348b0d5169a5a7ba34ddce6dca5ee5f6d7fa1751cffdebec76f128cae9dbc182c807211a91c7bf2f9532
-
SSDEEP
768:Hxk0dnXaA0tiqdwmWlCh+o6pMauVwhQg63nJC0fGu+/wpQO9Jp1Lwu:C0otY9iH3auVwKgcJPkJO7
Static task
static1
Behavioral task
behavioral1
Sample
db6e1b6448189f395724004a5465ce8c.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
db6e1b6448189f395724004a5465ce8c.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://00c04840242cfc406ecytywyhto.ntjflrx6uhwcmfhnn3yewv2wfhtqtjyfkvyrvjz4wuo6uw33yw7sfiid.onion/cytywyhto
http://00c04840242cfc406ecytywyhto.bitslet.uno/cytywyhto
http://00c04840242cfc406ecytywyhto.canyour.xyz/cytywyhto
http://00c04840242cfc406ecytywyhto.dogper.space/cytywyhto
http://00c04840242cfc406ecytywyhto.ballcan.xyz/cytywyhto
Targets
-
-
Target
db6e1b6448189f395724004a5465ce8c
-
Size
38KB
-
MD5
db6e1b6448189f395724004a5465ce8c
-
SHA1
96ae8d941c0f4a4f57e0c2e621ee57e82ccd88e4
-
SHA256
c7d0dd48bc5c3d78570fa583b6c05ec65202c6abb9d6bcf1a1bb7c5d5b74e091
-
SHA512
330f7b442764c93f9e972c95ac68dffce44a58fc0c56348b0d5169a5a7ba34ddce6dca5ee5f6d7fa1751cffdebec76f128cae9dbc182c807211a91c7bf2f9532
-
SSDEEP
768:Hxk0dnXaA0tiqdwmWlCh+o6pMauVwhQg63nJC0fGu+/wpQO9Jp1Lwu:C0otY9iH3auVwKgcJPkJO7
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (86) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-