General

  • Target

    20240917a5052518e8735f52112f0eec7f0416f9darkside

  • Size

    146KB

  • Sample

    240918-hsnjmayaja

  • MD5

    a5052518e8735f52112f0eec7f0416f9

  • SHA1

    5442e7cbd8d82d70937c1bd599472e7f202224d0

  • SHA256

    fa0259d8b6d87ae11532b7c3e26ef3ace9df21ae3919e97c73de88c6b75d2fb1

  • SHA512

    254fa270339145cba103b0cae10813548b54e0127f88c709dbbc83fc43a0dc828ef3d07ab19c917469e76a45a0903a858bbdc900412f11072f2d80677de2017d

  • SSDEEP

    3072:h6glyuxE4GsUPnliByocWepGEIqC6f7VaIAhzSCn8X:h6gDBGpvEByocWemFBV8

Malware Config

Targets

    • Target

      20240917a5052518e8735f52112f0eec7f0416f9darkside

    • Size

      146KB

    • MD5

      a5052518e8735f52112f0eec7f0416f9

    • SHA1

      5442e7cbd8d82d70937c1bd599472e7f202224d0

    • SHA256

      fa0259d8b6d87ae11532b7c3e26ef3ace9df21ae3919e97c73de88c6b75d2fb1

    • SHA512

      254fa270339145cba103b0cae10813548b54e0127f88c709dbbc83fc43a0dc828ef3d07ab19c917469e76a45a0903a858bbdc900412f11072f2d80677de2017d

    • SSDEEP

      3072:h6glyuxE4GsUPnliByocWepGEIqC6f7VaIAhzSCn8X:h6gDBGpvEByocWemFBV8

    • Renames multiple (4147) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks