Malware Analysis Report

2025-01-03 09:27

Sample ID 240604-zddvbabc92
Target 2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil
SHA256 3d6fc982dd43827b1e2252a00b7382608dd91b2906c10512a716a73ad8e33239
Tags
bootkit persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

3d6fc982dd43827b1e2252a00b7382608dd91b2906c10512a716a73ad8e33239

Threat Level: Shows suspicious behavior

The file 2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil was found to be: Shows suspicious behavior.

Malicious Activity Summary

bootkit persistence

Loads dropped DLL

Writes to the Master Boot Record (MBR)

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 20:35

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 20:35

Reported

2024-06-04 20:38

Platform

win7-20240221-en

Max time kernel

120s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe"

Signatures

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 write.52toolbox.com udp
CN 47.98.49.125:80 write.52toolbox.com tcp
CN 47.98.49.125:80 write.52toolbox.com tcp
US 8.8.8.8:53 s.52toolbox.com udp
CN 139.196.165.62:80 s.52toolbox.com tcp

Files

\Users\Admin\AppData\Local\Temp\netul.dll

MD5 8fcd24245b2222378e01f3c121c91f19
SHA1 ccb5c8a936af48286501385c0f773190d80734fd
SHA256 42e4e927c0e918748615436affce4f7b8214b9438be15c38ae3be36cf01541f1
SHA512 9d16b9001e2b7629b28f1941c90ac90955c8a1d2676cbe03b71746982caaa463aa30b6f4122a24492f84b9534bafd387d3bf5680dfc7a68235214c82327082f7

\Users\Admin\AppData\Local\Temp\{BF4B6F50-2D06-46c3-860A-EFD79EACED7A}.tmp\7z.dll

MD5 5e9acabc72b82e2020626d8d72c13ac4
SHA1 255598e95ba298834bca1fbce7e6e576e4b81e73
SHA256 de4303106ffb4e11141f72270f7e992737ed49b2993f56fb0b7f7db8ae03eeaf
SHA512 4fdafb37e16b3c5425aaa126a04ddf82d70f5bddf59ba3f6358323b8fbd0388f4236179fd3fdca4cfcacda4e5bcd27109c8d6d1d87ab0da65a19b2318639fbc9

memory/1956-18-0x0000000000840000-0x0000000000841000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 20:35

Reported

2024-06-04 20:38

Platform

win10v2004-20240508-en

Max time kernel

92s

Max time network

107s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe"

Signatures

Writes to the Master Boot Record (MBR)

bootkit persistence
Description Indicator Process Target
File opened for modification \??\PhysicalDrive0 C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-04_d22172cb916505d065918249122f63cc_magniber_revil.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 99.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 write.52toolbox.com udp
CN 47.98.49.125:80 write.52toolbox.com tcp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
CN 47.98.49.125:80 write.52toolbox.com tcp
US 8.8.8.8:53 s.52toolbox.com udp
CN 139.196.165.62:80 s.52toolbox.com tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 52.111.229.43:443 tcp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\netul.dll

MD5 8fcd24245b2222378e01f3c121c91f19
SHA1 ccb5c8a936af48286501385c0f773190d80734fd
SHA256 42e4e927c0e918748615436affce4f7b8214b9438be15c38ae3be36cf01541f1
SHA512 9d16b9001e2b7629b28f1941c90ac90955c8a1d2676cbe03b71746982caaa463aa30b6f4122a24492f84b9534bafd387d3bf5680dfc7a68235214c82327082f7

C:\Users\Admin\AppData\Local\Temp\{168C95ED-0C6D-49d2-B458-FBAF041CD4FA}.tmp\7z.dll

MD5 5e9acabc72b82e2020626d8d72c13ac4
SHA1 255598e95ba298834bca1fbce7e6e576e4b81e73
SHA256 de4303106ffb4e11141f72270f7e992737ed49b2993f56fb0b7f7db8ae03eeaf
SHA512 4fdafb37e16b3c5425aaa126a04ddf82d70f5bddf59ba3f6358323b8fbd0388f4236179fd3fdca4cfcacda4e5bcd27109c8d6d1d87ab0da65a19b2318639fbc9