General

  • Target

    2024-11-22_5bc38f3130148964d82a642b314c0811_magniber

  • Size

    292KB

  • Sample

    241122-ca6dts1rdx

  • MD5

    5bc38f3130148964d82a642b314c0811

  • SHA1

    b9755be3cb6de01745627c288253aeb680d307d6

  • SHA256

    a848bf1e584139446ba66896fe01aedf6726ce4e51bdb10b23afab53438c142a

  • SHA512

    0cbe3706a9a770aed43a3d5533a3ec183b236d14c4038c69490e719bfed2a835269727f7835256d711b3160bbc5f44d464efb20ab33750051ff26cd8319555bd

  • SSDEEP

    3072:jNdkchM4eJY+kPsSNxq8RPCUek4pZhzVB+Nm+5XNtOCq+IYKC9ADQFcgtgVsN6fd:BzhM4em+kPsgzr4tSRq+IYKEA0bN67t7

Malware Config

Targets

    • Target

      2024-11-22_5bc38f3130148964d82a642b314c0811_magniber

    • Size

      292KB

    • MD5

      5bc38f3130148964d82a642b314c0811

    • SHA1

      b9755be3cb6de01745627c288253aeb680d307d6

    • SHA256

      a848bf1e584139446ba66896fe01aedf6726ce4e51bdb10b23afab53438c142a

    • SHA512

      0cbe3706a9a770aed43a3d5533a3ec183b236d14c4038c69490e719bfed2a835269727f7835256d711b3160bbc5f44d464efb20ab33750051ff26cd8319555bd

    • SSDEEP

      3072:jNdkchM4eJY+kPsSNxq8RPCUek4pZhzVB+Nm+5XNtOCq+IYKC9ADQFcgtgVsN6fd:BzhM4em+kPsgzr4tSRq+IYKEA0bN67t7

    • Modifies security service

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks