Overview
overview
3Static
static
31.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...or1.sh
windows7_x64
331.214.157...or1.sh
windows10_x64
331.214.157...ode.sh
windows7_x64
331.214.157...ode.sh
windows10_x64
331.214.157...de1.sh
windows7_x64
331.214.157...de1.sh
windows10_x64
331.214.157...rst.sh
linux_amd64
31.214.157...rst.sh
linux_mipsel
31.214.157...rst.sh
linux_mips
31.214.157...ond.sh
linux_amd64
31.214.157...ond.sh
linux_mipsel
31.214.157...ond.sh
linux_mips
31.214.157...pt3.sh
windows7_x64
331.214.157...pt3.sh
windows10_x64
331.214.157...ile.sh
linux_amd64
31.214.157...ile.sh
linux_mipsel
31.214.157...ile.sh
linux_mips
31.214.157...ver.py
windows7_x64
331.214.157...ver.py
windows10_x64
331.214.157...der.sh
windows7_x64
331.214.157...der.sh
windows10_x64
331.214.157...cro_cr
linux_amd64
31.214.157...cro_cr
linux_mipsel
31.214.157...cro_cr
linux_mips
31.214.157...save.1
linux_amd64
31.214.157...save.1
linux_mipsel
31.214.157...save.1
linux_mips
31.214.157...save.2
linux_amd64
Resubmissions
12-10-2024 18:55
241012-xk1asazfrj 1030-11-2023 19:32
231130-x8zddshb2y 1028-06-2021 11:05
210628-3vdg7sx13e 3Analysis
-
max time kernel
149s -
max time network
52s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-06-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win7v20210410
Behavioral task
behavioral2
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win10v20210408
Behavioral task
behavioral3
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win7v20210410
Behavioral task
behavioral4
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win10v20210408
Behavioral task
behavioral5
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win7v20210410
Behavioral task
behavioral6
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win10v20210408
Behavioral task
behavioral7
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win7v20210410
Behavioral task
behavioral8
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win10v20210410
Behavioral task
behavioral9
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win7v20210408
Behavioral task
behavioral10
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win10v20210410
Behavioral task
behavioral11
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
ubuntu-amd64
Behavioral task
behavioral12
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsel
Behavioral task
behavioral13
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsbe
Behavioral task
behavioral14
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
ubuntu-amd64
Behavioral task
behavioral15
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsel
Behavioral task
behavioral16
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsbe
Behavioral task
behavioral17
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win7v20210408
Behavioral task
behavioral18
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win10v20210410
Behavioral task
behavioral19
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
ubuntu-amd64
Behavioral task
behavioral20
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsel
Behavioral task
behavioral21
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsbe
Behavioral task
behavioral22
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win7v20210408
Behavioral task
behavioral23
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win10v20210410
Behavioral task
behavioral24
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win7v20210410
Behavioral task
behavioral25
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win10v20210408
Behavioral task
behavioral26
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
ubuntu-amd64
Behavioral task
behavioral27
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsel
Behavioral task
behavioral28
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsbe
Behavioral task
behavioral29
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
ubuntu-amd64
Behavioral task
behavioral30
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsel
Behavioral task
behavioral31
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsbe
Behavioral task
behavioral32
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.2
Resource
ubuntu-amd64
General
-
Target
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
-
Size
5KB
-
MD5
3402c9373726396598011ef6ec1ea243
-
SHA1
919b574a4d000161e52d57b827976b6d9388b33f
-
SHA256
0243ac9f6148098de0b5f215c6e9802663284432492d29f7443a5dc36cb9aab5
-
SHA512
138d3d9de064a3107218856a510d968a857860c90a3bd7250eb79a8f7df13e588d7bfc90563a63c5a4dc9027e5d4d21cadb4118f4ff1add6fac6b2b9510b1ba6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 556 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 556 AcroRd32.exe 556 AcroRd32.exe 556 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 320 wrote to memory of 1396 320 cmd.exe 29 PID 320 wrote to memory of 1396 320 cmd.exe 29 PID 320 wrote to memory of 1396 320 cmd.exe 29 PID 1396 wrote to memory of 556 1396 rundll32.exe 31 PID 1396 wrote to memory of 556 1396 rundll32.exe 31 PID 1396 wrote to memory of 556 1396 rundll32.exe 31 PID 1396 wrote to memory of 556 1396 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\crypt3.sh1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\crypt3.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\crypt3.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:556
-
-