General

  • Target

    2024-05-24_6a70b5a34ef88b40b2b0459049c4008d_magniber

  • Size

    5.9MB

  • Sample

    240524-pte27scd2x

  • MD5

    6a70b5a34ef88b40b2b0459049c4008d

  • SHA1

    2545df72746722a350dcf7ebf824a3ed6ab54345

  • SHA256

    5adc92f5d990ec94b87fe865b062ee8cbb84441a67d2ee85f4a5aa9381a4e6f9

  • SHA512

    8af16155c528caadaecfa10c157a48d8fedb53c86e870f53b92daca738994f65a3406e66b516e25a12690eb6a3c46a560dfdaeb981b670d3b49412ff7b9b73c9

  • SSDEEP

    98304:fQviMiwd+WcstpBagkqJE6KFgKqkMMb18/KCmJxNE0iWu2oayjl24M1N/Fo:AF++7nKgf4CyEvWc9lzM/F

Malware Config

Targets

    • Target

      2024-05-24_6a70b5a34ef88b40b2b0459049c4008d_magniber

    • Size

      5.9MB

    • MD5

      6a70b5a34ef88b40b2b0459049c4008d

    • SHA1

      2545df72746722a350dcf7ebf824a3ed6ab54345

    • SHA256

      5adc92f5d990ec94b87fe865b062ee8cbb84441a67d2ee85f4a5aa9381a4e6f9

    • SHA512

      8af16155c528caadaecfa10c157a48d8fedb53c86e870f53b92daca738994f65a3406e66b516e25a12690eb6a3c46a560dfdaeb981b670d3b49412ff7b9b73c9

    • SSDEEP

      98304:fQviMiwd+WcstpBagkqJE6KFgKqkMMb18/KCmJxNE0iWu2oayjl24M1N/Fo:AF++7nKgf4CyEvWc9lzM/F

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks