General

  • Target

    762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3

  • Size

    260KB

  • Sample

    240531-pqr8cshf28

  • MD5

    5a1dfcf340060e11fd97775f08cc707d

  • SHA1

    ca7ba09b986c4c7c8590a2b90215785bef2efb41

  • SHA256

    762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3

  • SHA512

    9aae78da9f1c81ff671f721322031a2f12fefc3afaa90d5434a300f23775b568ed0129b629ec1910bb8345af64ff0b72f256c8f26377a5e6e527ddf5c81658b3

  • SSDEEP

    6144:+GuWNCix6AcxVBkerhbzfpZUU6wpKBWrl8mQEy:uOCix6JPzVhSwN58mty

Malware Config

Extracted

Path

C:\Users\Admin\README.398da5ec.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3 When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3

Targets

    • Target

      762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3

    • Size

      260KB

    • MD5

      5a1dfcf340060e11fd97775f08cc707d

    • SHA1

      ca7ba09b986c4c7c8590a2b90215785bef2efb41

    • SHA256

      762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3

    • SHA512

      9aae78da9f1c81ff671f721322031a2f12fefc3afaa90d5434a300f23775b568ed0129b629ec1910bb8345af64ff0b72f256c8f26377a5e6e527ddf5c81658b3

    • SSDEEP

      6144:+GuWNCix6AcxVBkerhbzfpZUU6wpKBWrl8mQEy:uOCix6JPzVhSwN58mty

    • DarkSide

      Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

    • Renames multiple (151) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks