Overview
overview
3Static
static
31.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...tor.sh
windows7_x64
331.214.157...tor.sh
windows10_x64
331.214.157...or1.sh
windows7_x64
331.214.157...or1.sh
windows10_x64
331.214.157...ode.sh
windows7_x64
331.214.157...ode.sh
windows10_x64
331.214.157...de1.sh
windows7_x64
331.214.157...de1.sh
windows10_x64
331.214.157...rst.sh
linux_amd64
31.214.157...rst.sh
linux_mipsel
31.214.157...rst.sh
linux_mips
31.214.157...ond.sh
linux_amd64
31.214.157...ond.sh
linux_mipsel
31.214.157...ond.sh
linux_mips
31.214.157...pt3.sh
windows7_x64
331.214.157...pt3.sh
windows10_x64
331.214.157...ile.sh
linux_amd64
31.214.157...ile.sh
linux_mipsel
31.214.157...ile.sh
linux_mips
31.214.157...ver.py
windows7_x64
331.214.157...ver.py
windows10_x64
331.214.157...der.sh
windows7_x64
331.214.157...der.sh
windows10_x64
331.214.157...cro_cr
linux_amd64
31.214.157...cro_cr
linux_mipsel
31.214.157...cro_cr
linux_mips
31.214.157...save.1
linux_amd64
31.214.157...save.1
linux_mipsel
31.214.157...save.1
linux_mips
31.214.157...save.2
linux_amd64
Resubmissions
12-10-2024 18:55
241012-xk1asazfrj 1030-11-2023 19:32
231130-x8zddshb2y 1028-06-2021 11:05
210628-3vdg7sx13e 3Analysis
-
max time kernel
150s -
max time network
39s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-06-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win7v20210410
Behavioral task
behavioral2
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_decryptor.sh
Resource
win10v20210408
Behavioral task
behavioral3
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win7v20210410
Behavioral task
behavioral4
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor.sh
Resource
win10v20210408
Behavioral task
behavioral5
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win7v20210410
Behavioral task
behavioral6
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/bash_encryptor1.sh
Resource
win10v20210408
Behavioral task
behavioral7
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win7v20210410
Behavioral task
behavioral8
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
Resource
win10v20210410
Behavioral task
behavioral9
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win7v20210408
Behavioral task
behavioral10
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code1.sh
Resource
win10v20210410
Behavioral task
behavioral11
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
ubuntu-amd64
Behavioral task
behavioral12
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsel
Behavioral task
behavioral13
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_first.sh
Resource
debian9-mipsbe
Behavioral task
behavioral14
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
ubuntu-amd64
Behavioral task
behavioral15
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsel
Behavioral task
behavioral16
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt2_second.sh
Resource
debian9-mipsbe
Behavioral task
behavioral17
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win7v20210408
Behavioral task
behavioral18
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt3.sh
Resource
win10v20210410
Behavioral task
behavioral19
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
ubuntu-amd64
Behavioral task
behavioral20
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsel
Behavioral task
behavioral21
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/crypt_file.sh
Resource
debian9-mipsbe
Behavioral task
behavioral22
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win7v20210408
Behavioral task
behavioral23
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/pass_server.py
Resource
win10v20210410
Behavioral task
behavioral24
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win7v20210410
Behavioral task
behavioral25
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/socket_code_sender.sh
Resource
win10v20210408
Behavioral task
behavioral26
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
ubuntu-amd64
Behavioral task
behavioral27
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsel
Behavioral task
behavioral28
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr
Resource
debian9-mipsbe
Behavioral task
behavioral29
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
ubuntu-amd64
Behavioral task
behavioral30
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsel
Behavioral task
behavioral31
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.1
Resource
debian9-mipsbe
Behavioral task
behavioral32
Sample
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/supermicro_cr.save.2
Resource
ubuntu-amd64
General
-
Target
31.214.157.40_#DarkRadiation_by_@r3dbU7z/api/code.sh
-
Size
4KB
-
MD5
4409d0036c0668c33ca152abb8eb8776
-
SHA1
e918e127494ac5dcc839e827b1ca9e40a0650cb0
-
SHA256
4c037b151ab09258f31193160d5b715c2fd14290344bfdf12fab16301095f7b7
-
SHA512
e0524e00bd42d3d4eb38e1b84e80416d95d9f081792e66f16a38e8fb8b5b71bd3b06b9fc7143bddeb87f4101aa12beacabcd540a985e8f2249a8e6f4d7a18059
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\sh_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 652 AcroRd32.exe 652 AcroRd32.exe 652 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 1340 wrote to memory of 1988 1340 cmd.exe 27 PID 1340 wrote to memory of 1988 1340 cmd.exe 27 PID 1340 wrote to memory of 1988 1340 cmd.exe 27 PID 1988 wrote to memory of 652 1988 rundll32.exe 31 PID 1988 wrote to memory of 652 1988 rundll32.exe 31 PID 1988 wrote to memory of 652 1988 rundll32.exe 31 PID 1988 wrote to memory of 652 1988 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\code.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\code.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\31.214.157.40_#DarkRadiation_by_@r3dbU7z\api\code.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:652
-
-