General
-
Target
2024-05-14_fcdf9497b815e3c5b8661e7799069750_magniber
-
Size
24.1MB
-
Sample
240514-y5dsysef4y
-
MD5
fcdf9497b815e3c5b8661e7799069750
-
SHA1
ca8160664cc43f241c09ebd77a7dca33cb2674d3
-
SHA256
120d6ee2323cd2789ff173ead0aef6f0644ab11b9ff3533d5834c4ee2f7b2654
-
SHA512
2beebedb5e64268c3c0ab3beca168ccf54f5053d91e3a1694ba41c5ac447d7c88a8563352d9a7f57563772bc11edb51bdc4c3e1e303ca8059b5eb26da1ed13f3
-
SSDEEP
393216:R4opD2KL7xaypjDMLCo5Cn606zo6uPCEf6h:bD2KL7wyV
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-14_fcdf9497b815e3c5b8661e7799069750_magniber.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-05-14_fcdf9497b815e3c5b8661e7799069750_magniber
-
Size
24.1MB
-
MD5
fcdf9497b815e3c5b8661e7799069750
-
SHA1
ca8160664cc43f241c09ebd77a7dca33cb2674d3
-
SHA256
120d6ee2323cd2789ff173ead0aef6f0644ab11b9ff3533d5834c4ee2f7b2654
-
SHA512
2beebedb5e64268c3c0ab3beca168ccf54f5053d91e3a1694ba41c5ac447d7c88a8563352d9a7f57563772bc11edb51bdc4c3e1e303ca8059b5eb26da1ed13f3
-
SSDEEP
393216:R4opD2KL7xaypjDMLCo5Cn606zo6uPCEf6h:bD2KL7wyV
-
UPX dump on OEP (original entry point)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-