MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2ab74ce11c4462db427db65ff5755db4d5267d373172384a241017150e14675. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Magniber


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f2ab74ce11c4462db427db65ff5755db4d5267d373172384a241017150e14675
SHA3-384 hash: 3b43adf4c69ee1d746b3a788802e5ca09a0b2d915dde23b87aa668839e79c623ae148316431705985e4f7f41183542d0
SHA1 hash: 12c822103678fed7b928f0202eb7e51714ab3b56
MD5 hash: 4160c35d3c600712b528e8072de1bc58
humanhash: high-asparagus-item-bakerloo
File name:3.exe
Download: download sample
Signature Magniber
File size:21'504 bytes
First seen:2021-06-22 14:05:35 UTC
Last seen:2021-06-22 14:42:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 384:LhRjUkyke1MncmmVnvFA6p3XMReCvOu410LtdjgRyCbXbO9hB7tJP9x/nDkN:LDjokncmmR7pXCvOZ02yEXEhBZeN
Threatray 4 similar samples on MalwareBazaar
TLSH 58A2CF25B831D68FD4D8D93C259A0C57D096B9E193664E03F29B7913D1DCB930D0B4ED
Reporter LittleRedBean2
Tags:exe Magniber Ransomware

Intelligence


File Origin
# of uploads :
2
# of downloads :
272
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3.exe
Verdict:
No threats detected
Analysis date:
2021-06-22 14:17:17 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 438426 Sample: 3.exe Startdate: 22/06/2021 Architecture: WINDOWS Score: 48 15 clientconfig.passport.net 2->15 19 Multi AV Scanner detection for submitted file 2->19 7 3.exe 2->7         started        signatures3 process4 process5 9 WerFault.exe 17 9 7->9         started        dnsIp6 17 192.168.2.1 unknown unknown 9->17 13 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 9->13 dropped file7
Threat name:
Win64.Ransomware.Encoder
Status:
Malicious
First seen:
2021-06-18 19:17:36 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
  5/5
Result
Malware family:
magniber
Score:
  10/10
Tags:
family:magniber ransomware
Behaviour
Interacts with shadow copies
Opens file in notepad (likely ransom note)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Program crash
Suspicious use of SetThreadContext
Deletes shadow copies
Magniber Ransomware
Process spawned unexpected child process
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
f2ab74ce11c4462db427db65ff5755db4d5267d373172384a241017150e14675
MD5 hash:
4160c35d3c600712b528e8072de1bc58
SHA1 hash:
12c822103678fed7b928f0202eb7e51714ab3b56
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Magniber

Executable exe f2ab74ce11c4462db427db65ff5755db4d5267d373172384a241017150e14675

(this sample)

  
Delivery method
Distributed via web download

Comments