General

  • Target

    2024-07-09_e2345db4f8ebb6ed5e78f14e6b57384c_darkside

  • Size

    147KB

  • Sample

    240709-n7t8lsvdlg

  • MD5

    e2345db4f8ebb6ed5e78f14e6b57384c

  • SHA1

    e5f299b1d4f2d5d0837d4b8229074c266ba62f14

  • SHA256

    9075cb70be32cfd3c97dc814eab5456eef5800c07acc4862094c09680cf4667b

  • SHA512

    3baa786b6472dd4a267ca06e045e918e5bba0e10c08adb77ccc5444d6ff694525659685f6a8abc10e5eb99e1b0cc2d0b6faa584f6cb404190b88c509be9a2a41

  • SSDEEP

    3072:O6glyuxE4GsUPnliByocWepteMq6UJhlQ8fH/H:O6gDBGpvEByocWe+b6Ul/f

Malware Config

Targets

    • Target

      2024-07-09_e2345db4f8ebb6ed5e78f14e6b57384c_darkside

    • Size

      147KB

    • MD5

      e2345db4f8ebb6ed5e78f14e6b57384c

    • SHA1

      e5f299b1d4f2d5d0837d4b8229074c266ba62f14

    • SHA256

      9075cb70be32cfd3c97dc814eab5456eef5800c07acc4862094c09680cf4667b

    • SHA512

      3baa786b6472dd4a267ca06e045e918e5bba0e10c08adb77ccc5444d6ff694525659685f6a8abc10e5eb99e1b0cc2d0b6faa584f6cb404190b88c509be9a2a41

    • SSDEEP

      3072:O6glyuxE4GsUPnliByocWepteMq6UJhlQ8fH/H:O6gDBGpvEByocWe+b6Ul/f

    • Renames multiple (8063) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks