General
-
Target
c752934305e1b89f82798ea2c26f70b3_JaffaCakes118
-
Size
20KB
-
Sample
241205-mtf86axjaq
-
MD5
c752934305e1b89f82798ea2c26f70b3
-
SHA1
d5034027ea79146d7597542d0b9ae040ec632e18
-
SHA256
20e29bfcd2d3372af66eec996bcbc0babbeb8bc36b6a3edcd3afc70782aaea2e
-
SHA512
ad52c0b638770999fa9de9242161e3d8b30cfa9a66ce34d6dc870b47cf1a9479a76ea04b556affddcfbdb8bf229e488a9fb2a3c5d225df58cdb467c57c2ed179
-
SSDEEP
384:ebYQedPt/jViMyZXH8N2hjpzge669ZrzGYzPbJBn9JTpXJYDd4Pm3ixs0xsSBB/q:UYtNt74f62hjN79B9Jh9J1+DaP2gBhb
Static task
static1
Behavioral task
behavioral1
Sample
c752934305e1b89f82798ea2c26f70b3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c752934305e1b89f82798ea2c26f70b3_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://f498ace85800dc40daditeiyb.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/diteiyb
http://f498ace85800dc40daditeiyb.topsaid.site/diteiyb
http://f498ace85800dc40daditeiyb.gosmark.space/diteiyb
http://f498ace85800dc40daditeiyb.iecard.top/diteiyb
http://f498ace85800dc40daditeiyb.ourunit.xyz/diteiyb
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://2cc03a300254d290c0diteiyb.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/diteiyb
http://2cc03a300254d290c0diteiyb.topsaid.site/diteiyb
http://2cc03a300254d290c0diteiyb.gosmark.space/diteiyb
http://2cc03a300254d290c0diteiyb.iecard.top/diteiyb
http://2cc03a300254d290c0diteiyb.ourunit.xyz/diteiyb
Targets
-
-
Target
c752934305e1b89f82798ea2c26f70b3_JaffaCakes118
-
Size
20KB
-
MD5
c752934305e1b89f82798ea2c26f70b3
-
SHA1
d5034027ea79146d7597542d0b9ae040ec632e18
-
SHA256
20e29bfcd2d3372af66eec996bcbc0babbeb8bc36b6a3edcd3afc70782aaea2e
-
SHA512
ad52c0b638770999fa9de9242161e3d8b30cfa9a66ce34d6dc870b47cf1a9479a76ea04b556affddcfbdb8bf229e488a9fb2a3c5d225df58cdb467c57c2ed179
-
SSDEEP
384:ebYQedPt/jViMyZXH8N2hjpzge669ZrzGYzPbJBn9JTpXJYDd4Pm3ixs0xsSBB/q:UYtNt74f62hjN79B9Jh9J1+DaP2gBhb
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Magniber family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-