General
-
Target
02ba3fa9b8eab79fce998cc95068d0850d9f7a649e68885f5b898dfd9a15f86a
-
Size
39KB
-
Sample
240820-kjf5aswfjl
-
MD5
378724bc77e6e2dc4aedeed2284aee78
-
SHA1
34eca8f2dfb3b1310edb58520ac7dcb701ae1238
-
SHA256
02ba3fa9b8eab79fce998cc95068d0850d9f7a649e68885f5b898dfd9a15f86a
-
SHA512
e7ffdd0908f21a44bdab537271e5b52bfe5d6c1d6aae1285e45cf1d14b324f31c8ba7928c9a8861fcc23717fd5e6e572e6ee161e905ac6d97f173a614d1dbadb
-
SSDEEP
768:ETG3GMYYztufCPgSGHk/YUze//YwufcxuZ3A47+R:OQVuHvUzenYwKcx6A47+
Static task
static1
Behavioral task
behavioral1
Sample
02ba3fa9b8eab79fce998cc95068d0850d9f7a649e68885f5b898dfd9a15f86a.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02ba3fa9b8eab79fce998cc95068d0850d9f7a649e68885f5b898dfd9a15f86a.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://c4f0a298e20808104yxxumuibd.amjblanypjy2tews4maivajjj7zhb4yxafhbqv7yqzej3bjq4n3h2nyd.onion/yxxumuibd
http://c4f0a298e20808104yxxumuibd.veryits.quest/yxxumuibd
http://c4f0a298e20808104yxxumuibd.rawloop.fit/yxxumuibd
http://c4f0a298e20808104yxxumuibd.billfun.uno/yxxumuibd
http://c4f0a298e20808104yxxumuibd.knewpen.space/yxxumuibd
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://3cfcfa5820acfc40c4yxxumuibd.amjblanypjy2tews4maivajjj7zhb4yxafhbqv7yqzej3bjq4n3h2nyd.onion/yxxumuibd
http://3cfcfa5820acfc40c4yxxumuibd.veryits.quest/yxxumuibd
http://3cfcfa5820acfc40c4yxxumuibd.rawloop.fit/yxxumuibd
http://3cfcfa5820acfc40c4yxxumuibd.billfun.uno/yxxumuibd
http://3cfcfa5820acfc40c4yxxumuibd.knewpen.space/yxxumuibd
Targets
-
-
Target
02ba3fa9b8eab79fce998cc95068d0850d9f7a649e68885f5b898dfd9a15f86a
-
Size
39KB
-
MD5
378724bc77e6e2dc4aedeed2284aee78
-
SHA1
34eca8f2dfb3b1310edb58520ac7dcb701ae1238
-
SHA256
02ba3fa9b8eab79fce998cc95068d0850d9f7a649e68885f5b898dfd9a15f86a
-
SHA512
e7ffdd0908f21a44bdab537271e5b52bfe5d6c1d6aae1285e45cf1d14b324f31c8ba7928c9a8861fcc23717fd5e6e572e6ee161e905ac6d97f173a614d1dbadb
-
SSDEEP
768:ETG3GMYYztufCPgSGHk/YUze//YwufcxuZ3A47+R:OQVuHvUzenYwKcx6A47+
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (75) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-