General
-
Target
a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d
-
Size
30KB
-
Sample
240530-beyzwagf7v
-
MD5
4b63c4a60469d933cd76a31aae1892ae
-
SHA1
6d9eda625a918c06007fb58f010e4120490419a3
-
SHA256
a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d
-
SHA512
06beee2bbc68e082f80e2ff1fb54cb4833c6100308ff6dc737d05170432689dd9e4d8ff37ad831ae0d5170382c0110a5a711b9e8c53074bdcd688de866442131
-
SSDEEP
768:neIjgezsb2BTkZPM0qf/uR+G9D7H98hWR4rONNxLkyhSccdf:neim2oPM08/uR+c7dkY/fpcd
Static task
static1
Behavioral task
behavioral1
Sample
a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\README.b565854b.TXT
darkside
http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3
Targets
-
-
Target
a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d
-
Size
30KB
-
MD5
4b63c4a60469d933cd76a31aae1892ae
-
SHA1
6d9eda625a918c06007fb58f010e4120490419a3
-
SHA256
a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d
-
SHA512
06beee2bbc68e082f80e2ff1fb54cb4833c6100308ff6dc737d05170432689dd9e4d8ff37ad831ae0d5170382c0110a5a711b9e8c53074bdcd688de866442131
-
SSDEEP
768:neIjgezsb2BTkZPM0qf/uR+G9D7H98hWR4rONNxLkyhSccdf:neim2oPM08/uR+c7dkY/fpcd
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Renames multiple (160) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry
-