Overview
overview
3Static
static
31.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...or1.sh
windows7_x64
331.214.157...or1.sh
windows10_x64
331.214.157...ode.sh
windows7_x64
331.214.157...ode.sh
windows10_x64
331.214.157...de1.sh
windows7_x64
331.214.157...de1.sh
windows10_x64
331.214.157...rst.sh
linux_amd64
31.214.157...rst.sh
linux_mipsel
31.214.157...rst.sh
linux_mips
31.214.157...ond.sh
linux_amd64
31.214.157...ond.sh
linux_mipsel
31.214.157...ond.sh
linux_mips
31.214.157...pt3.sh
windows7_x64
331.214.157...pt3.sh
windows10_x64
331.214.157...ile.sh
linux_amd64
31.214.157...ile.sh
linux_mipsel
31.214.157...ile.sh
linux_mips
31.214.157...ver.py
windows7_x64
331.214.157...ver.py
windows10_x64
331.214.157...der.sh
windows7_x64
331.214.157...der.sh
windows10_x64
331.214.157...cro_cr
linux_amd64
31.214.157...cro_cr
linux_mipsel
31.214.157...cro_cr
linux_mips
31.214.157...save.1
linux_amd64
31.214.157...save.1
linux_mipsel
31.214.157...save.1
linux_mips
31.214.157...save.2
linux_amd64
Resubmissions
12-10-2024 18:55
241012-xk1asazfrj 1030-11-2023 19:32
231130-x8zddshb2y 1028-06-2021 11:05
210628-3vdg7sx13e 3Analysis
-
max time kernel
150s -
max time network
60s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-06-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win7v20210410
Behavioral task
behavioral2
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win10v20210408
Behavioral task
behavioral3
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win7v20210410
Behavioral task
behavioral4
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win10v20210408
Behavioral task
behavioral5
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win7v20210410
Behavioral task
behavioral6
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win10v20210408
Behavioral task
behavioral7
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win7v20210410
Behavioral task
behavioral8
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win10v20210410
Behavioral task
behavioral9
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win7v20210408
Behavioral task
behavioral10
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win10v20210410
Behavioral task
behavioral11
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
ubuntu-amd64
Behavioral task
behavioral12
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsel
Behavioral task
behavioral13
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsbe
Behavioral task
behavioral14
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
ubuntu-amd64
Behavioral task
behavioral15
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsel
Behavioral task
behavioral16
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsbe
Behavioral task
behavioral17
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win7v20210408
Behavioral task
behavioral18
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win10v20210410
Behavioral task
behavioral19
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
ubuntu-amd64
Behavioral task
behavioral20
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsel
Behavioral task
behavioral21
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsbe
Behavioral task
behavioral22
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win7v20210408
Behavioral task
behavioral23
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win10v20210410
Behavioral task
behavioral24
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win7v20210410
Behavioral task
behavioral25
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win10v20210408
Behavioral task
behavioral26
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
ubuntu-amd64
Behavioral task
behavioral27
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsel
Behavioral task
behavioral28
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsbe
Behavioral task
behavioral29
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
ubuntu-amd64
Behavioral task
behavioral30
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsel
Behavioral task
behavioral31
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsbe
Behavioral task
behavioral32
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.2
Resource
ubuntu-amd64
General
-
Target
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
-
Size
341B
-
MD5
013e22cea40101aabb5104374b9799f1
-
SHA1
a7e7734c2c6f929bca996a20ecbe15f5a7647ae8
-
SHA256
c881660ad1883ad35f1f6b6cb75ef28cda471b54b58ef594b45183ba71ee6126
-
SHA512
eedde28f522f3d779cff26d9605b1d9250797df9cd375c0eb657e0d976853611ab12161f2f5309f9b346a49101a4e0d19efdfa773f80a9f444460a5745267b5d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 652 AcroRd32.exe 652 AcroRd32.exe 652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1796 1996 cmd.exe 28 PID 1996 wrote to memory of 1796 1996 cmd.exe 28 PID 1996 wrote to memory of 1796 1996 cmd.exe 28 PID 1796 wrote to memory of 652 1796 rundll32.exe 31 PID 1796 wrote to memory of 652 1796 rundll32.exe 31 PID 1796 wrote to memory of 652 1796 rundll32.exe 31 PID 1796 wrote to memory of 652 1796 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_decryptor.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_decryptor.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_decryptor.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:652
-
-