General
-
Target
JaffaCakes118_a2478cf8d1c823fb8ccf323692b23121
-
Size
38KB
-
Sample
250108-qw3fystrfq
-
MD5
a2478cf8d1c823fb8ccf323692b23121
-
SHA1
088017b775533223ce21686de37f351337e43401
-
SHA256
064998d1e0e34525fd5a5d4dd384adc77ba752ee2256e1d0d2bdbb197a64de9c
-
SHA512
6082f709957d9fd026d4fff7a98dc77b4a337986f5754899f641165316d36eae4060c92f7122b813ea89aa1ad527cb55debe01e55621eba8b5d4f574ffb56ff7
-
SSDEEP
768:BsLGs0M9c39PH14ax7Gmaz6XDYHMeyyvXKGz6NfS3/UYuGjo4g7VpMm8Wl:BsLGs0AcRH1hx7GmazMDbeNfKGz6NK3c
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a2478cf8d1c823fb8ccf323692b23121.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a2478cf8d1c823fb8ccf323692b23121.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://c4302668ba001c1034wajxnjkw.r4vwwgioac7x2ftfglttr7qst265edv6rhmsdmjdgt6wxzuhgx4ynfid.onion/wajxnjkw
http://c4302668ba001c1034wajxnjkw.lessmod.quest/wajxnjkw
http://c4302668ba001c1034wajxnjkw.fixkeys.top/wajxnjkw
http://c4302668ba001c1034wajxnjkw.phoneis.website/wajxnjkw
http://c4302668ba001c1034wajxnjkw.donehim.space/wajxnjkw
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://f0ac20783a3426500wajxnjkw.r4vwwgioac7x2ftfglttr7qst265edv6rhmsdmjdgt6wxzuhgx4ynfid.onion/wajxnjkw
http://f0ac20783a3426500wajxnjkw.lessmod.quest/wajxnjkw
http://f0ac20783a3426500wajxnjkw.fixkeys.top/wajxnjkw
http://f0ac20783a3426500wajxnjkw.phoneis.website/wajxnjkw
http://f0ac20783a3426500wajxnjkw.donehim.space/wajxnjkw
Targets
-
-
Target
JaffaCakes118_a2478cf8d1c823fb8ccf323692b23121
-
Size
38KB
-
MD5
a2478cf8d1c823fb8ccf323692b23121
-
SHA1
088017b775533223ce21686de37f351337e43401
-
SHA256
064998d1e0e34525fd5a5d4dd384adc77ba752ee2256e1d0d2bdbb197a64de9c
-
SHA512
6082f709957d9fd026d4fff7a98dc77b4a337986f5754899f641165316d36eae4060c92f7122b813ea89aa1ad527cb55debe01e55621eba8b5d4f574ffb56ff7
-
SSDEEP
768:BsLGs0M9c39PH14ax7Gmaz6XDYHMeyyvXKGz6NfS3/UYuGjo4g7VpMm8Wl:BsLGs0AcRH1hx7GmazMDbeNfKGz6NK3c
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Magniber family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Suspicious use of SetThreadContext
-