General

  • Target

    2024-09-17_13d1cd6bc101aaeabbb33fe9af40be3f_darkside

  • Size

    146KB

  • Sample

    240917-vxv6gsvekn

  • MD5

    13d1cd6bc101aaeabbb33fe9af40be3f

  • SHA1

    fdf8e840d9b5241bcf3b458cac72c2fb4d4cec00

  • SHA256

    a8bd5d36c5653a89f5643dd7d7ff27146dcc95f0ef7c3a507f8c42af1ee6b367

  • SHA512

    80c10fc4b173ff9ba30d0a3944645402995c66b356e079e52e343f7fa8c493ccc2ce4f864f0ab26ebd2eda59108167fc710d7fcab95038bdb3e6c187074d7f89

  • SSDEEP

    3072:76glyuxE4GsUPnliByocWepRs7lD9DVGUI:76gDBGpvEByocWeHkg

Malware Config

Targets

    • Target

      2024-09-17_13d1cd6bc101aaeabbb33fe9af40be3f_darkside

    • Size

      146KB

    • MD5

      13d1cd6bc101aaeabbb33fe9af40be3f

    • SHA1

      fdf8e840d9b5241bcf3b458cac72c2fb4d4cec00

    • SHA256

      a8bd5d36c5653a89f5643dd7d7ff27146dcc95f0ef7c3a507f8c42af1ee6b367

    • SHA512

      80c10fc4b173ff9ba30d0a3944645402995c66b356e079e52e343f7fa8c493ccc2ce4f864f0ab26ebd2eda59108167fc710d7fcab95038bdb3e6c187074d7f89

    • SSDEEP

      3072:76glyuxE4GsUPnliByocWepRs7lD9DVGUI:76gDBGpvEByocWeHkg

    • Renames multiple (374) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks