General
-
Target
54baef5cf3ca7669d23f0b6d03feed7abee07fc61f9f030205a1bccf10d6e0d0
-
Size
263KB
-
Sample
240530-rywa4abg61
-
MD5
453a50596bcf0ae9d2217bcfd4ae66a0
-
SHA1
f01bde5dad09cc170a1f3053237efdeb27d19526
-
SHA256
54baef5cf3ca7669d23f0b6d03feed7abee07fc61f9f030205a1bccf10d6e0d0
-
SHA512
0a8d648c7cd1d2ba54c70c193e668942597a4f50543c0440546f89b7deea8c554aea3a9b6e1e3c0c23a5fc71ebf4b777a0bba7f2e661497357751389d39cf0c5
-
SSDEEP
6144:UV3XAsmv3jXdJptoCerINAvNQ5LZ7ytziHTS41:UhXAsQ3jNO/NEZ7UziHP
Static task
static1
Behavioral task
behavioral1
Sample
54baef5cf3ca7669d23f0b6d03feed7abee07fc61f9f030205a1bccf10d6e0d0.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
54baef5cf3ca7669d23f0b6d03feed7abee07fc61f9f030205a1bccf10d6e0d0.dll
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\Contacts\README.d055bb79.TXT
darkside
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/MYM57PZKKZKVJWS2PAFUZ4ZUZRK3JW4O1VQBMFON3RZIMKZ9CGVFLH2HV089EGT5
Targets
-
-
Target
54baef5cf3ca7669d23f0b6d03feed7abee07fc61f9f030205a1bccf10d6e0d0
-
Size
263KB
-
MD5
453a50596bcf0ae9d2217bcfd4ae66a0
-
SHA1
f01bde5dad09cc170a1f3053237efdeb27d19526
-
SHA256
54baef5cf3ca7669d23f0b6d03feed7abee07fc61f9f030205a1bccf10d6e0d0
-
SHA512
0a8d648c7cd1d2ba54c70c193e668942597a4f50543c0440546f89b7deea8c554aea3a9b6e1e3c0c23a5fc71ebf4b777a0bba7f2e661497357751389d39cf0c5
-
SSDEEP
6144:UV3XAsmv3jXdJptoCerINAvNQ5LZ7ytziHTS41:UhXAsQ3jNO/NEZ7UziHP
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-