General
-
Target
59ac1b76180d491293be58b14b7aee0070e232202445bb9eea676c8fa3c381da
-
Size
257KB
-
Sample
240531-klzdnadd77
-
MD5
d1dc9cd84b9ba5e462e9f76513928d42
-
SHA1
0f2df217f5970048692bc2365a07c7cd52c55c17
-
SHA256
59ac1b76180d491293be58b14b7aee0070e232202445bb9eea676c8fa3c381da
-
SHA512
599051b030f54a589fff0b0977f69cd5adbadb7393b45db831debdd41cbf85252a1019041bad3fae48f981a71ff9b2118343ab01e69c90963e4ea53c5c74503e
-
SSDEEP
6144:mqhaoZZRrvPJtomDFQv8ldJ6EkJOcT4sOXGOrrlae+q92:m8ftLromBQv+dMeerOrrlPJ92
Static task
static1
Behavioral task
behavioral1
Sample
59ac1b76180d491293be58b14b7aee0070e232202445bb9eea676c8fa3c381da.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59ac1b76180d491293be58b14b7aee0070e232202445bb9eea676c8fa3c381da.dll
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Users\Admin\3D Objects\README.622dec8a.TXT
darkside
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/ZWQHXVE7MW9JXE5N1EGIP6IMEFAGC7LNN6WJCBVKJFKB5QXP6LUZV654ASG7977V
Targets
-
-
Target
59ac1b76180d491293be58b14b7aee0070e232202445bb9eea676c8fa3c381da
-
Size
257KB
-
MD5
d1dc9cd84b9ba5e462e9f76513928d42
-
SHA1
0f2df217f5970048692bc2365a07c7cd52c55c17
-
SHA256
59ac1b76180d491293be58b14b7aee0070e232202445bb9eea676c8fa3c381da
-
SHA512
599051b030f54a589fff0b0977f69cd5adbadb7393b45db831debdd41cbf85252a1019041bad3fae48f981a71ff9b2118343ab01e69c90963e4ea53c5c74503e
-
SSDEEP
6144:mqhaoZZRrvPJtomDFQv8ldJ6EkJOcT4sOXGOrrlae+q92:m8ftLromBQv+dMeerOrrlPJ92
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Blocklisted process makes network request
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-