General
-
Target
3187619e1573920b7ef0cf1daecdabd4_JaffaCakes118
-
Size
20KB
-
Sample
241010-yc764ashnd
-
MD5
3187619e1573920b7ef0cf1daecdabd4
-
SHA1
aa3831500894819b2444f25af36e8ddc7aea1cda
-
SHA256
929a064ebaea59c3bd2442df949754d1cdd12cb547929927ec7b7adaafc05726
-
SHA512
c83121077118fe574aec011e91b95d985edf2377aae453065009dea9479850724ae0861f02338f876a3a7827c4e079a8faec229ec5939520eb9ef66d27e30d1a
-
SSDEEP
384:mCx9m9yVxnPhI1hEtGFlGgRzeZHtJmTqP2F47vhdds6sWDa:mk9m9yVxPhshEtGFlGgRze7Jxhrs
Static task
static1
Behavioral task
behavioral1
Sample
3187619e1573920b7ef0cf1daecdabd4_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3187619e1573920b7ef0cf1daecdabd4_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://baccf010c8f03ca06eillvahk.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/illvahk
http://baccf010c8f03ca06eillvahk.ourunit.xyz/illvahk
http://baccf010c8f03ca06eillvahk.topsaid.site/illvahk
http://baccf010c8f03ca06eillvahk.gosmark.space/illvahk
http://baccf010c8f03ca06eillvahk.iecard.top/illvahk
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://beac32f0063cfc3090illvahk.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/illvahk
http://beac32f0063cfc3090illvahk.ourunit.xyz/illvahk
http://beac32f0063cfc3090illvahk.topsaid.site/illvahk
http://beac32f0063cfc3090illvahk.gosmark.space/illvahk
http://beac32f0063cfc3090illvahk.iecard.top/illvahk
Targets
-
-
Target
3187619e1573920b7ef0cf1daecdabd4_JaffaCakes118
-
Size
20KB
-
MD5
3187619e1573920b7ef0cf1daecdabd4
-
SHA1
aa3831500894819b2444f25af36e8ddc7aea1cda
-
SHA256
929a064ebaea59c3bd2442df949754d1cdd12cb547929927ec7b7adaafc05726
-
SHA512
c83121077118fe574aec011e91b95d985edf2377aae453065009dea9479850724ae0861f02338f876a3a7827c4e079a8faec229ec5939520eb9ef66d27e30d1a
-
SSDEEP
384:mCx9m9yVxnPhI1hEtGFlGgRzeZHtJmTqP2F47vhdds6sWDa:mk9m9yVxPhshEtGFlGgRze7Jxhrs
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-