General
-
Target
2b2aff0f96023927c709a40c979612bbf123ec59478d7f91a06d25e55f98460b
-
Size
31KB
-
Sample
240806-mkfahaxanq
-
MD5
e1659736d8370fe135939f745970aa38
-
SHA1
f2b6d826def78f1a1133f8df90e6baaa1dc00014
-
SHA256
2b2aff0f96023927c709a40c979612bbf123ec59478d7f91a06d25e55f98460b
-
SHA512
3d7a655a6bcfc744b55c6fd1af1c70435ad977de7497c4aeaffdbb5741233ea2ac59ad9ca8c51f600d4e47dd0fb02b42251e5a87a63d866b3ea0f636eb07c34d
-
SSDEEP
768:LUScQ/KanYrq9yf2OMAlRyd0+bMLyb9kQX7e+u6Tg:LUz2iqcOOMAfLyb9kQX7UN
Static task
static1
Behavioral task
behavioral1
Sample
Darkside.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Darkside.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\README.f6405d07.TXT
darkside
http://darksidedxcftmqa.onion/polifilm/AWeu5Sv7zTTCTjZD8YkgoPRznfE5r7G-vbsXok9EvfiaNL_eDwRlgRMruMHisnEF
http://darksidfqzcuhtk2.onion/2AHUVJ3VGS97NUG5J5EYMQM5PJO77V9V0GDT3UYIJGFZUTOQRLUX593CQ2EZ2ZEH
Targets
-
-
Target
Darkside.exe
-
Size
59KB
-
MD5
cfcfb68901ffe513e9f0d76b17d02f96
-
SHA1
766b30e5a37d1bc8d8fe5c7cacc314504a44ac1f
-
SHA256
17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61
-
SHA512
0d26fa9478f4626107e38c570d1bae1049b744181cf0395d95fb07675575ca393d88d4783bf31bdf11bef1da5648a5a53a6d95b21492f96b4de35c0ec323ae0c
-
SSDEEP
768:9jjV7Iax7F3DS4/S96/P3rsAc4ci5pwwX5+R4VYY23W5:vx7Fu4/i6/P3rlckx5+R4VDZ5
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (166) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1