General
-
Target
2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside
-
Size
146KB
-
Sample
240916-stvz7svenn
-
MD5
b71bd8482d6e872bd867966a1e572ac9
-
SHA1
926d496eed4f6735999dcac03b9295222ea45dc1
-
SHA256
f156e0cc550938d59d92fcf7768d5070360d46c80555ed4f972d2af0f4233fdb
-
SHA512
4392f36b65fe82ce102a0faf55f2fdce4cd8463cf42eab2ca68bcbe3578de4804d5ec475ed2294fc8e7bef9e319af18ee2656dea4b499ff43476f2a8f35d85b6
-
SSDEEP
3072:x6glyuxE4GsUPnliByocWepqzW0lfCoCufrJikFt1YY:x6gDBGpvEByocWeczXlqIldvYY
Behavioral task
behavioral1
Sample
2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\qcH9iqGVb.README.txt
lockbit
https://getsession.org/download
Extracted
C:\qcH9iqGVb.README.txt
lockbit
https://getsession.org/download
Targets
-
-
Target
2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside
-
Size
146KB
-
MD5
b71bd8482d6e872bd867966a1e572ac9
-
SHA1
926d496eed4f6735999dcac03b9295222ea45dc1
-
SHA256
f156e0cc550938d59d92fcf7768d5070360d46c80555ed4f972d2af0f4233fdb
-
SHA512
4392f36b65fe82ce102a0faf55f2fdce4cd8463cf42eab2ca68bcbe3578de4804d5ec475ed2294fc8e7bef9e319af18ee2656dea4b499ff43476f2a8f35d85b6
-
SSDEEP
3072:x6glyuxE4GsUPnliByocWepqzW0lfCoCufrJikFt1YY:x6gDBGpvEByocWeczXlqIldvYY
-
Renames multiple (339) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-