General
-
Target
ea3c8766df6f8390dd6a0e411cec77eb8f5df0556935ea1d217f1938454d3108
-
Size
256KB
-
Sample
240531-e9a33sfc4y
-
MD5
d6b0b65300c7f9c0b700ab21f58990cc
-
SHA1
1148829c7032b7c5907337b20902c70a584710a9
-
SHA256
ea3c8766df6f8390dd6a0e411cec77eb8f5df0556935ea1d217f1938454d3108
-
SHA512
e7671432d936a800588859b6c878efba1a0e60b42abc5b0286420dd39cc612f67a2779c1f4d5870060b69446778c6207f6ef840125c73decfa765b910d5e8590
-
SSDEEP
6144:BG2/9A5wlFbBkPj8uYDJTVmxAznfcFf0UoEF:k2VA5wlFbBkPj8uqJqkfcFfHoE
Static task
static1
Behavioral task
behavioral1
Sample
ea3c8766df6f8390dd6a0e411cec77eb8f5df0556935ea1d217f1938454d3108.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ea3c8766df6f8390dd6a0e411cec77eb8f5df0556935ea1d217f1938454d3108.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Recovery\8f60a382-0d98-11ef-817d-5aba25856535\README.d055bb79.TXT
darkside
http://dark24vx6fsmdrtbzdzjv6ckz4yqyued4uz455oqpctko7m6vbrzibad.onion/86GND2UGQRIP7OXI4KAHWDF3QR4ZDTJ3GGZA02KJYG7H6UDZ2U0DVB03WIUKOK73
Targets
-
-
Target
ea3c8766df6f8390dd6a0e411cec77eb8f5df0556935ea1d217f1938454d3108
-
Size
256KB
-
MD5
d6b0b65300c7f9c0b700ab21f58990cc
-
SHA1
1148829c7032b7c5907337b20902c70a584710a9
-
SHA256
ea3c8766df6f8390dd6a0e411cec77eb8f5df0556935ea1d217f1938454d3108
-
SHA512
e7671432d936a800588859b6c878efba1a0e60b42abc5b0286420dd39cc612f67a2779c1f4d5870060b69446778c6207f6ef840125c73decfa765b910d5e8590
-
SSDEEP
6144:BG2/9A5wlFbBkPj8uYDJTVmxAznfcFf0UoEF:k2VA5wlFbBkPj8uqJqkfcFfHoE
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Renames multiple (159) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-