General

  • Target

    2024-09-14_7846b146a31b75e9c8617e9b418fb3f1_darkside

  • Size

    146KB

  • Sample

    240914-jftqjstcje

  • MD5

    7846b146a31b75e9c8617e9b418fb3f1

  • SHA1

    e3693398aa8ea823945ffc938a3d8ea6e378a039

  • SHA256

    a88c337c37e65b1ed0a7083125000e0d1284a9d89770a9ef0f8ea689405c558a

  • SHA512

    158d4d1d7343b1a23ccccc749f51a42dac7a2d9ef9750bd369459ab15d602a3cef105167901a2275ae1b6eee7b3872611f09944f646c645ab4913b6df834c7e9

  • SSDEEP

    3072:l6glyuxE4GsUPnliByocWepHpfr3dmPbBxCA:l6gDBGpvEByocWe1pfr3YPVcA

Malware Config

Targets

    • Target

      2024-09-14_7846b146a31b75e9c8617e9b418fb3f1_darkside

    • Size

      146KB

    • MD5

      7846b146a31b75e9c8617e9b418fb3f1

    • SHA1

      e3693398aa8ea823945ffc938a3d8ea6e378a039

    • SHA256

      a88c337c37e65b1ed0a7083125000e0d1284a9d89770a9ef0f8ea689405c558a

    • SHA512

      158d4d1d7343b1a23ccccc749f51a42dac7a2d9ef9750bd369459ab15d602a3cef105167901a2275ae1b6eee7b3872611f09944f646c645ab4913b6df834c7e9

    • SSDEEP

      3072:l6glyuxE4GsUPnliByocWepHpfr3dmPbBxCA:l6gDBGpvEByocWe1pfr3YPVcA

    • Renames multiple (299) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks