General
-
Target
cb0261d9a3e77ffecdb51914b3690f18_JaffaCakes118
-
Size
20KB
-
Sample
241206-eywkmszmc1
-
MD5
cb0261d9a3e77ffecdb51914b3690f18
-
SHA1
9f2604c82b06cc7b74f354afa8daebec9e66fb83
-
SHA256
b8509f34589fa23a5d2db7d84b70a351f8bf928a789b45f0f10168b48319ecb9
-
SHA512
8ad0761d452013f47a1805360057dec90c1016c76c80781e8420a4f29824687b0b396031521192d291055f125c96a87100cbe931d682b40e6e9edcb6acd39364
-
SSDEEP
384:JV0mpLDSVriGcs3QhglYdOKgnoRoeo//HRpADW8qw4yyydir9r/WX7BBunmoFYfY:JyWLWVriGu6Yw7noRK/HRpADV4yysi5e
Static task
static1
Behavioral task
behavioral1
Sample
cb0261d9a3e77ffecdb51914b3690f18_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cb0261d9a3e77ffecdb51914b3690f18_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://34c06a48a400dc40fcuahnpdvb.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/uahnpdvb
http://34c06a48a400dc40fcuahnpdvb.iecard.top/uahnpdvb
http://34c06a48a400dc40fcuahnpdvb.topsaid.site/uahnpdvb
http://34c06a48a400dc40fcuahnpdvb.ourunit.xyz/uahnpdvb
http://34c06a48a400dc40fcuahnpdvb.gosmark.space/uahnpdvb
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://78800e98f0cc24503uahnpdvb.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/uahnpdvb
http://78800e98f0cc24503uahnpdvb.iecard.top/uahnpdvb
http://78800e98f0cc24503uahnpdvb.topsaid.site/uahnpdvb
http://78800e98f0cc24503uahnpdvb.ourunit.xyz/uahnpdvb
http://78800e98f0cc24503uahnpdvb.gosmark.space/uahnpdvb
Targets
-
-
Target
cb0261d9a3e77ffecdb51914b3690f18_JaffaCakes118
-
Size
20KB
-
MD5
cb0261d9a3e77ffecdb51914b3690f18
-
SHA1
9f2604c82b06cc7b74f354afa8daebec9e66fb83
-
SHA256
b8509f34589fa23a5d2db7d84b70a351f8bf928a789b45f0f10168b48319ecb9
-
SHA512
8ad0761d452013f47a1805360057dec90c1016c76c80781e8420a4f29824687b0b396031521192d291055f125c96a87100cbe931d682b40e6e9edcb6acd39364
-
SSDEEP
384:JV0mpLDSVriGcs3QhglYdOKgnoRoeo//HRpADW8qw4yyydir9r/WX7BBunmoFYfY:JyWLWVriGu6Yw7noRK/HRpADV4yysi5e
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Magniber family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-