General
-
Target
f9afb31bc17811e5ab4fa406f105b1fe.bin
-
Size
28KB
-
Sample
230427-ccfwysfa41
-
MD5
568dab684fcbf125a459bfca41edc4cb
-
SHA1
112c7d6e8e525fe5b921091bdfec0a2da4892707
-
SHA256
3aee5045a26dd6da9d4a21c60ff4175d2bbf6fb48937d118b874feba6a90cb58
-
SHA512
74bfaf88f4dcc42844d10555ad166dc18299da60aa6a8c160fbbe510254c612607555875950af0b356c32924463e64157e3e974d78202d6e73b51cf009680e60
-
SSDEEP
768:xUG6QtXkt2cG4iotHiL9my08VlJAPLTHVicGsyX+:IQetDAIemy08V3AXwAyu
Static task
static1
Behavioral task
behavioral1
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
C:\Recovery\a8e30002-b1b4-11ed-a8b7-cee1c2fbb193\How To Restore Your Files.txt
darkside
Targets
-
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
-
Size
79KB
-
MD5
f9afb31bc17811e5ab4fa406f105b1fe
-
SHA1
d1a9449dcc8a3aa0c887bce71f128866175f679a
-
SHA256
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f
-
SHA512
6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55
-
SSDEEP
1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-