Overview
overview
3Static
static
31.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...or1.sh
windows7_x64
331.214.157...or1.sh
windows10_x64
331.214.157...ode.sh
windows7_x64
331.214.157...ode.sh
windows10_x64
331.214.157...de1.sh
windows7_x64
331.214.157...de1.sh
windows10_x64
331.214.157...rst.sh
linux_amd64
31.214.157...rst.sh
linux_mipsel
31.214.157...rst.sh
linux_mips
31.214.157...ond.sh
linux_amd64
31.214.157...ond.sh
linux_mipsel
31.214.157...ond.sh
linux_mips
31.214.157...pt3.sh
windows7_x64
331.214.157...pt3.sh
windows10_x64
331.214.157...ile.sh
linux_amd64
31.214.157...ile.sh
linux_mipsel
31.214.157...ile.sh
linux_mips
31.214.157...ver.py
windows7_x64
331.214.157...ver.py
windows10_x64
331.214.157...der.sh
windows7_x64
331.214.157...der.sh
windows10_x64
331.214.157...cro_cr
linux_amd64
31.214.157...cro_cr
linux_mipsel
31.214.157...cro_cr
linux_mips
31.214.157...save.1
linux_amd64
31.214.157...save.1
linux_mipsel
31.214.157...save.1
linux_mips
31.214.157...save.2
linux_amd64
Resubmissions
12-10-2024 18:55
241012-xk1asazfrj 1030-11-2023 19:32
231130-x8zddshb2y 1028-06-2021 11:05
210628-3vdg7sx13e 3Analysis
-
max time kernel
151s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-06-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win7v20210410
Behavioral task
behavioral2
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win10v20210408
Behavioral task
behavioral3
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win7v20210410
Behavioral task
behavioral4
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win10v20210408
Behavioral task
behavioral5
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win7v20210410
Behavioral task
behavioral6
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win10v20210408
Behavioral task
behavioral7
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win7v20210410
Behavioral task
behavioral8
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win10v20210410
Behavioral task
behavioral9
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win7v20210408
Behavioral task
behavioral10
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win10v20210410
Behavioral task
behavioral11
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
ubuntu-amd64
Behavioral task
behavioral12
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsel
Behavioral task
behavioral13
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsbe
Behavioral task
behavioral14
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
ubuntu-amd64
Behavioral task
behavioral15
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsel
Behavioral task
behavioral16
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsbe
Behavioral task
behavioral17
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win7v20210408
Behavioral task
behavioral18
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win10v20210410
Behavioral task
behavioral19
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
ubuntu-amd64
Behavioral task
behavioral20
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsel
Behavioral task
behavioral21
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsbe
Behavioral task
behavioral22
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win7v20210408
Behavioral task
behavioral23
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win10v20210410
Behavioral task
behavioral24
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win7v20210410
Behavioral task
behavioral25
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win10v20210408
Behavioral task
behavioral26
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
ubuntu-amd64
Behavioral task
behavioral27
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsel
Behavioral task
behavioral28
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsbe
Behavioral task
behavioral29
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
ubuntu-amd64
Behavioral task
behavioral30
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsel
Behavioral task
behavioral31
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsbe
Behavioral task
behavioral32
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.2
Resource
ubuntu-amd64
General
-
Target
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
-
Size
2KB
-
MD5
27be323f0057b258961da949655deaec
-
SHA1
05d60c843a5b85cc51799d638cfaad2b4009dbf9
-
SHA256
122d4473f8336fa9b3e69d3fb58112b22e7efd9435f53f90d06f9cf8a1dbccc1
-
SHA512
98a48ae25952ec165b3d99516f67948062b2810ff43d993d33f7c2770c78b5739547208c2003d1b6e53d7fdb4212361f202fbfee49e8546c60e55a40a2d3e758
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 360 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 360 AcroRd32.exe 360 AcroRd32.exe 360 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 1208 wrote to memory of 1244 1208 cmd.exe 27 PID 1208 wrote to memory of 1244 1208 cmd.exe 27 PID 1208 wrote to memory of 1244 1208 cmd.exe 27 PID 1244 wrote to memory of 360 1244 rundll32.exe 31 PID 1244 wrote to memory of 360 1244 rundll32.exe 31 PID 1244 wrote to memory of 360 1244 rundll32.exe 31 PID 1244 wrote to memory of 360 1244 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_encryptor.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_encryptor.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_encryptor.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:360
-
-