General
-
Target
377ea8e8c63f2b19b07c69492e99f3d8_JaffaCakes118
-
Size
20KB
-
Sample
241012-aefmvs1hjb
-
MD5
377ea8e8c63f2b19b07c69492e99f3d8
-
SHA1
dbe31e03e08116a69e435b4e083722a9745e54bc
-
SHA256
27ccf224a002dfa52b238c36b894991ca8f0b40c0741383c56fa4c31dbdd5cba
-
SHA512
c90414add29ad621923d38bdc3464295525ad884e64d9686a092a80e829f35692e1fdadd0e925539c0e0151f476d70860f48cc6a60504243eb3d96190431f87c
-
SSDEEP
384:KGAfHlDSTBkbMlSykOMIPSo0RsClrRjp1Sw6knL7ZcnA6AcIdrVpXsx45Xwpo:SfFAqbMlSykOnN0RsOFp1Sw6oKAjcIdj
Static task
static1
Behavioral task
behavioral1
Sample
377ea8e8c63f2b19b07c69492e99f3d8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
377ea8e8c63f2b19b07c69492e99f3d8_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://e68cc6b058b092c014qbvpseec.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/qbvpseec
http://e68cc6b058b092c014qbvpseec.gosmark.space/qbvpseec
http://e68cc6b058b092c014qbvpseec.ourunit.xyz/qbvpseec
http://e68cc6b058b092c014qbvpseec.topsaid.site/qbvpseec
http://e68cc6b058b092c014qbvpseec.iecard.top/qbvpseec
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://8224c89032284020bcqbvpseec.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/qbvpseec
http://8224c89032284020bcqbvpseec.gosmark.space/qbvpseec
http://8224c89032284020bcqbvpseec.ourunit.xyz/qbvpseec
http://8224c89032284020bcqbvpseec.topsaid.site/qbvpseec
http://8224c89032284020bcqbvpseec.iecard.top/qbvpseec
Targets
-
-
Target
377ea8e8c63f2b19b07c69492e99f3d8_JaffaCakes118
-
Size
20KB
-
MD5
377ea8e8c63f2b19b07c69492e99f3d8
-
SHA1
dbe31e03e08116a69e435b4e083722a9745e54bc
-
SHA256
27ccf224a002dfa52b238c36b894991ca8f0b40c0741383c56fa4c31dbdd5cba
-
SHA512
c90414add29ad621923d38bdc3464295525ad884e64d9686a092a80e829f35692e1fdadd0e925539c0e0151f476d70860f48cc6a60504243eb3d96190431f87c
-
SSDEEP
384:KGAfHlDSTBkbMlSykOMIPSo0RsClrRjp1Sw6knL7ZcnA6AcIdrVpXsx45Xwpo:SfFAqbMlSykOnN0RsOFp1Sw6oKAjcIdj
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-