General
-
Target
f1d9097da5a25704b82246e6a1530237_JaffaCakes118
-
Size
38KB
-
Sample
240415-y54z5she6y
-
MD5
f1d9097da5a25704b82246e6a1530237
-
SHA1
1a21d31df7941616cf6e2e3c7b790b2096ce3b4e
-
SHA256
f104ab345da41762fa5a07302859289e162fe197c2b1270f8f5d12354a670b5e
-
SHA512
d5f4ea9ad04dc7472c9ed1db54ff2ec570c89c53ea8374bf7da19f27ada0d7c766af457f953896d7fc62046d00a6df7a62d71ae36982b6939d75c34d2c6ae96d
-
SSDEEP
768:1Czs1U46clW4VbXoTS22idEzKfu/m+SyNtLrSSAcLCjXUZdr:eqsclW494TSr8EzKG/NdroU
Static task
static1
Behavioral task
behavioral1
Sample
f1d9097da5a25704b82246e6a1530237_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f1d9097da5a25704b82246e6a1530237_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://da68cc1016a8b8d0a8inacxat.nvnt3l2aee6eejcmzq3w72d4dnkmeemljh5qroq2lrr2spgtnqpxdgad.onion/inacxat
http://da68cc1016a8b8d0a8inacxat.riddare.quest/inacxat
http://da68cc1016a8b8d0a8inacxat.buyhas.space/inacxat
http://da68cc1016a8b8d0a8inacxat.owedbad.uno/inacxat
http://da68cc1016a8b8d0a8inacxat.tillnor.monster/inacxat
Targets
-
-
Target
f1d9097da5a25704b82246e6a1530237_JaffaCakes118
-
Size
38KB
-
MD5
f1d9097da5a25704b82246e6a1530237
-
SHA1
1a21d31df7941616cf6e2e3c7b790b2096ce3b4e
-
SHA256
f104ab345da41762fa5a07302859289e162fe197c2b1270f8f5d12354a670b5e
-
SHA512
d5f4ea9ad04dc7472c9ed1db54ff2ec570c89c53ea8374bf7da19f27ada0d7c766af457f953896d7fc62046d00a6df7a62d71ae36982b6939d75c34d2c6ae96d
-
SSDEEP
768:1Czs1U46clW4VbXoTS22idEzKfu/m+SyNtLrSSAcLCjXUZdr:eqsclW494TSr8EzKG/NdroU
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (71) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-