Overview
overview
3Static
static
31.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...or1.sh
windows7_x64
331.214.157...or1.sh
windows10_x64
331.214.157...ode.sh
windows7_x64
331.214.157...ode.sh
windows10_x64
331.214.157...de1.sh
windows7_x64
331.214.157...de1.sh
windows10_x64
331.214.157...rst.sh
linux_amd64
31.214.157...rst.sh
linux_mipsel
31.214.157...rst.sh
linux_mips
31.214.157...ond.sh
linux_amd64
31.214.157...ond.sh
linux_mipsel
31.214.157...ond.sh
linux_mips
31.214.157...pt3.sh
windows7_x64
331.214.157...pt3.sh
windows10_x64
331.214.157...ile.sh
linux_amd64
31.214.157...ile.sh
linux_mipsel
31.214.157...ile.sh
linux_mips
31.214.157...ver.py
windows7_x64
331.214.157...ver.py
windows10_x64
331.214.157...der.sh
windows7_x64
331.214.157...der.sh
windows10_x64
331.214.157...cro_cr
linux_amd64
31.214.157...cro_cr
linux_mipsel
31.214.157...cro_cr
linux_mips
31.214.157...save.1
linux_amd64
31.214.157...save.1
linux_mipsel
31.214.157...save.1
linux_mips
31.214.157...save.2
linux_amd64
Resubmissions
12-10-2024 18:55
241012-xk1asazfrj 1030-11-2023 19:32
231130-x8zddshb2y 1028-06-2021 11:05
210628-3vdg7sx13e 3Analysis
-
max time kernel
150s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-06-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win7v20210410
Behavioral task
behavioral2
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win10v20210408
Behavioral task
behavioral3
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win7v20210410
Behavioral task
behavioral4
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win10v20210408
Behavioral task
behavioral5
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win7v20210410
Behavioral task
behavioral6
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win10v20210408
Behavioral task
behavioral7
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win7v20210410
Behavioral task
behavioral8
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win10v20210410
Behavioral task
behavioral9
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win7v20210408
Behavioral task
behavioral10
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win10v20210410
Behavioral task
behavioral11
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
ubuntu-amd64
Behavioral task
behavioral12
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsel
Behavioral task
behavioral13
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsbe
Behavioral task
behavioral14
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
ubuntu-amd64
Behavioral task
behavioral15
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsel
Behavioral task
behavioral16
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsbe
Behavioral task
behavioral17
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win7v20210408
Behavioral task
behavioral18
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win10v20210410
Behavioral task
behavioral19
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
ubuntu-amd64
Behavioral task
behavioral20
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsel
Behavioral task
behavioral21
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsbe
Behavioral task
behavioral22
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win7v20210408
Behavioral task
behavioral23
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win10v20210410
Behavioral task
behavioral24
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win7v20210410
Behavioral task
behavioral25
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win10v20210408
Behavioral task
behavioral26
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
ubuntu-amd64
Behavioral task
behavioral27
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsel
Behavioral task
behavioral28
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsbe
Behavioral task
behavioral29
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
ubuntu-amd64
Behavioral task
behavioral30
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsel
Behavioral task
behavioral31
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsbe
Behavioral task
behavioral32
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.2
Resource
ubuntu-amd64
General
-
Target
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
-
Size
2KB
-
MD5
ba7d82ff5ddaa55e206e346bdfdf2872
-
SHA1
8fc79950d628ec81bc04bda01dd7aa4868c8259e
-
SHA256
691afd4ef5f33d99053c57456ce9fa126e29d51d4dd510928193d8c3332547b1
-
SHA512
92d4454ea73182d86686f0384480aaee09636705655b7e7a40e470d12677cd9ab471e33af79b81de52c362a2119292b7952fb6b84c42baa44812e07d348696ae
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 1440 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 1440 AcroRd32.exe 1440 AcroRd32.exe 1440 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 1012 wrote to memory of 1388 1012 cmd.exe 27 PID 1012 wrote to memory of 1388 1012 cmd.exe 27 PID 1012 wrote to memory of 1388 1012 cmd.exe 27 PID 1388 wrote to memory of 1440 1388 rundll32.exe 31 PID 1388 wrote to memory of 1440 1388 rundll32.exe 31 PID 1388 wrote to memory of 1440 1388 rundll32.exe 31 PID 1388 wrote to memory of 1440 1388 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_encryptor1.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_encryptor1.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\bash_encryptor1.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1440
-
-