General
-
Target
2024-07-01_0ad4f1567592a3d73ec61e461f7bce4c_darkside
-
Size
150KB
-
Sample
240701-eyt2tazakq
-
MD5
0ad4f1567592a3d73ec61e461f7bce4c
-
SHA1
842ba1ad3799c0e65dafce7e71c0f4585e26443f
-
SHA256
5fc30ad2bc0d586a9b21fab26e66ef52ace6eb7ce7fc22c3a693a9ec9669ae05
-
SHA512
99cc76d1e5ca57aeeaea2154587a95b8e043c9e713636f93574945cf25cafa76cd1a8a7f4ff72e2244c3ff26220aecbc1df76dc791468142baa601c4a7f19b5d
-
SSDEEP
3072:g6glyuxE4GsUPnliByocWepeKNHOpEu/vpmtO:g6gDBGpvEByocWegUWZ
Behavioral task
behavioral1
Sample
2024-07-01_0ad4f1567592a3d73ec61e461f7bce4c_darkside.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-07-01_0ad4f1567592a3d73ec61e461f7bce4c_darkside.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\3wHht2h41.README.txt
Extracted
C:\3wHht2h41.README.txt
Targets
-
-
Target
2024-07-01_0ad4f1567592a3d73ec61e461f7bce4c_darkside
-
Size
150KB
-
MD5
0ad4f1567592a3d73ec61e461f7bce4c
-
SHA1
842ba1ad3799c0e65dafce7e71c0f4585e26443f
-
SHA256
5fc30ad2bc0d586a9b21fab26e66ef52ace6eb7ce7fc22c3a693a9ec9669ae05
-
SHA512
99cc76d1e5ca57aeeaea2154587a95b8e043c9e713636f93574945cf25cafa76cd1a8a7f4ff72e2244c3ff26220aecbc1df76dc791468142baa601c4a7f19b5d
-
SSDEEP
3072:g6glyuxE4GsUPnliByocWepeKNHOpEu/vpmtO:g6gDBGpvEByocWegUWZ
Score10/10-
Renames multiple (366) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-