General

  • Target

    2024-07-10_2f948f1174f626c357e32082a41b2608_darkside

  • Size

    145KB

  • Sample

    240710-3qvkdaygna

  • MD5

    2f948f1174f626c357e32082a41b2608

  • SHA1

    6cc04220cc7b08b9d910765d49e63b1f76d5a8e4

  • SHA256

    b08194fdeffcc70daccf02c8eb3f9c15ba34cff4052cd670e01822caab93526a

  • SHA512

    bccdab1d8b34e4612e1e9d0b478dd719fd35be202b2390075ede664a295348dd51dbd78d8009e062ff281a6a9ae7f7f501ef47d47895dac4a5c028f7a52d64bb

  • SSDEEP

    3072:MqJogYkcSNm9V7D5WIlADZSQRhaTgInT:Mq2kc4m9tD5BdOcgI

Malware Config

Targets

    • Target

      2024-07-10_2f948f1174f626c357e32082a41b2608_darkside

    • Size

      145KB

    • MD5

      2f948f1174f626c357e32082a41b2608

    • SHA1

      6cc04220cc7b08b9d910765d49e63b1f76d5a8e4

    • SHA256

      b08194fdeffcc70daccf02c8eb3f9c15ba34cff4052cd670e01822caab93526a

    • SHA512

      bccdab1d8b34e4612e1e9d0b478dd719fd35be202b2390075ede664a295348dd51dbd78d8009e062ff281a6a9ae7f7f501ef47d47895dac4a5c028f7a52d64bb

    • SSDEEP

      3072:MqJogYkcSNm9V7D5WIlADZSQRhaTgInT:Mq2kc4m9tD5BdOcgI

    • Renames multiple (321) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks