General
-
Target
2024-09-10_04e651e75deb8edc024b8295532f5d3f_darkside
-
Size
146KB
-
Sample
240910-mr8kma1eng
-
MD5
04e651e75deb8edc024b8295532f5d3f
-
SHA1
d8660e404e98db706ae3b74fbb04d08a2ac7130b
-
SHA256
3934455289f9b1a4d37c785c89e8c177c58e20406e6f1a825b3b2ae19d665da2
-
SHA512
b1b46d0fb381ecb15aff708c0751cff95992b15d897602cc119590f6c1ce13b2e88b8c862dfc1e8bdd8c7b96a5eb3bb0eafb2f3b0a2e8485dd2257888cb19b6f
-
SSDEEP
3072:mqJogYkcSNm9V7Db/aSG5HF5v5pANOhKT:mq2kc4m9tDvQHF5Xt
Behavioral task
behavioral1
Sample
2024-09-10_04e651e75deb8edc024b8295532f5d3f_darkside.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-10_04e651e75deb8edc024b8295532f5d3f_darkside.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\HdbtqCuyh.README.txt
Targets
-
-
Target
2024-09-10_04e651e75deb8edc024b8295532f5d3f_darkside
-
Size
146KB
-
MD5
04e651e75deb8edc024b8295532f5d3f
-
SHA1
d8660e404e98db706ae3b74fbb04d08a2ac7130b
-
SHA256
3934455289f9b1a4d37c785c89e8c177c58e20406e6f1a825b3b2ae19d665da2
-
SHA512
b1b46d0fb381ecb15aff708c0751cff95992b15d897602cc119590f6c1ce13b2e88b8c862dfc1e8bdd8c7b96a5eb3bb0eafb2f3b0a2e8485dd2257888cb19b6f
-
SSDEEP
3072:mqJogYkcSNm9V7Db/aSG5HF5v5pANOhKT:mq2kc4m9tDvQHF5Xt
Score10/10-
Renames multiple (326) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-