General

  • Target

    2024-04-11_f2a643f3575933425c957f329ad4056b_jeefo_magniber

  • Size

    4.5MB

  • Sample

    240411-jtgcdafb98

  • MD5

    f2a643f3575933425c957f329ad4056b

  • SHA1

    1fcdce146d91f1d170fe5aed4692e000f4030abc

  • SHA256

    2bc53af6f8a30259923cffd848d1651fb8e2d61c66f3566144745e6bbd9d2926

  • SHA512

    bdf590ad4acab46ef282b6492359cf3733e7ce1350607a8e26f65eedb36cf4c7fa88ad63f670ec2525c0454a617221f9c33653e40fc50c482734a0d6f6fd1d94

  • SSDEEP

    98304:ZbALqAZo/+sODYSNJ/GgYWsRvQk9lmVJaRy/9CIzrcdYcUeWkAZq3xJWa2y:ZXAZtsAugT2QJmMCIzgdYPeWkAZq3xJz

Malware Config

Targets

    • Target

      2024-04-11_f2a643f3575933425c957f329ad4056b_jeefo_magniber

    • Size

      4.5MB

    • MD5

      f2a643f3575933425c957f329ad4056b

    • SHA1

      1fcdce146d91f1d170fe5aed4692e000f4030abc

    • SHA256

      2bc53af6f8a30259923cffd848d1651fb8e2d61c66f3566144745e6bbd9d2926

    • SHA512

      bdf590ad4acab46ef282b6492359cf3733e7ce1350607a8e26f65eedb36cf4c7fa88ad63f670ec2525c0454a617221f9c33653e40fc50c482734a0d6f6fd1d94

    • SSDEEP

      98304:ZbALqAZo/+sODYSNJ/GgYWsRvQk9lmVJaRy/9CIzrcdYcUeWkAZq3xJWa2y:ZXAZtsAugT2QJmMCIzgdYPeWkAZq3xJz

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks