General
-
Target
bfb31c96f9e6285f5bb60433f2e45898b8a7183a2591157dc1d766be16c29893
-
Size
54KB
-
Sample
210501-wxddtht5wx
-
MD5
a3d964aaf642d626474f02ba3ae4f49b
-
SHA1
a4e2deb65f97f657b50e48707b883ce2b138e787
-
SHA256
bfb31c96f9e6285f5bb60433f2e45898b8a7183a2591157dc1d766be16c29893
-
SHA512
f424466a1019e82a11b3317160f2009c572179355d6a48a42547cb3e57d99eaa4bf3425fc0c002f3be154270abc5ff97e53a39e0c3a7c09db2354ef87de96e4f
Static task
static1
Behavioral task
behavioral1
Sample
bfb31c96f9e6285f5bb60433f2e45898b8a7183a2591157dc1d766be16c29893.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
bfb31c96f9e6285f5bb60433f2e45898b8a7183a2591157dc1d766be16c29893.exe
Resource
win10v20210410
Malware Config
Extracted
C:\\README.53411c86.TXT
darkside
https://ibb.co/87JcyNT
https://ibb.co/QfBfq0y
https://ibb.co/L5cwM9L
https://ibb.co/Tr6JvBd
https://ibb.co/Wcw1MsD
https://ibb.co/y0GtL0z
https://ibb.co/v1ykbV3
https://ibb.co/G5bLyFj
https://ibb.co/YpY238t
http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/122/primehealthservices/2HL7CQH8SIgjDOC6Drmy91ks9uF-8tH01iNecY1tAkFnQK2c0TEWlOek8biiBK9K
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/LD73WIA272ABZP7ZPOH20QAECU6KOF3IBL2EVVZVFIQDZSADZFKOCUIYRMBI0PSN
Targets
-
-
Target
bfb31c96f9e6285f5bb60433f2e45898b8a7183a2591157dc1d766be16c29893
-
Size
54KB
-
MD5
a3d964aaf642d626474f02ba3ae4f49b
-
SHA1
a4e2deb65f97f657b50e48707b883ce2b138e787
-
SHA256
bfb31c96f9e6285f5bb60433f2e45898b8a7183a2591157dc1d766be16c29893
-
SHA512
f424466a1019e82a11b3317160f2009c572179355d6a48a42547cb3e57d99eaa4bf3425fc0c002f3be154270abc5ff97e53a39e0c3a7c09db2354ef87de96e4f
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-