General
-
Target
f632dce9c6fea6d80521a00fd89bfc7dbeaeb1e66ef680159c2c4209662a5d8e
-
Size
2.2MB
-
Sample
240410-nbd7hsdf53
-
MD5
99762b33396b8128e6e72fc66a8e8939
-
SHA1
edb33f83c49268ef604e073d33f358b5b4da60ce
-
SHA256
f632dce9c6fea6d80521a00fd89bfc7dbeaeb1e66ef680159c2c4209662a5d8e
-
SHA512
71a5c78519ea6028bfffdb0d1199c36b245a70766e650dcab85b333966b6a66b3a8e1a672eee495a11a9ee5f722e00625e546f6d85b86067a6484ac27e4ed036
-
SSDEEP
49152:yz+eK5Bhzwrb/TEvO90dL3BmAFd4A64nsfJqyM4w7qLiC/gv4sxZ2EAKEz1q:yz+rzLyM1GLhukEAO
Static task
static1
Behavioral task
behavioral1
Sample
f632dce9c6fea6d80521a00fd89bfc7dbeaeb1e66ef680159c2c4209662a5d8e.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f632dce9c6fea6d80521a00fd89bfc7dbeaeb1e66ef680159c2c4209662a5d8e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Downloads\README.txt
darkside
Targets
-
-
Target
f632dce9c6fea6d80521a00fd89bfc7dbeaeb1e66ef680159c2c4209662a5d8e
-
Size
2.2MB
-
MD5
99762b33396b8128e6e72fc66a8e8939
-
SHA1
edb33f83c49268ef604e073d33f358b5b4da60ce
-
SHA256
f632dce9c6fea6d80521a00fd89bfc7dbeaeb1e66ef680159c2c4209662a5d8e
-
SHA512
71a5c78519ea6028bfffdb0d1199c36b245a70766e650dcab85b333966b6a66b3a8e1a672eee495a11a9ee5f722e00625e546f6d85b86067a6484ac27e4ed036
-
SSDEEP
49152:yz+eK5Bhzwrb/TEvO90dL3BmAFd4A64nsfJqyM4w7qLiC/gv4sxZ2EAKEz1q:yz+rzLyM1GLhukEAO
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-