General

  • Target

    2024-09-20_01917d8ef944c6fda4666f67b4927d46_darkside

  • Size

    146KB

  • Sample

    240920-ap5pqszaqj

  • MD5

    01917d8ef944c6fda4666f67b4927d46

  • SHA1

    4b811bfc90504e935774457b002d785143804f24

  • SHA256

    9c09ece9784fad75103d9ecc51a7036dd1b9d6b9ddf945c580abc9e626e39d1a

  • SHA512

    395dd71cfc7be177f84e4be772f3ca869e7915c951cc183cb708deb0a464215b447901f1744f8c71d141481c4ca02f3ba53e69e1f43f73ff59307744ce05fa53

  • SSDEEP

    3072:p6glyuxE4GsUPnliByocWepjQ2d2jAhBHIWh1o:p6gDBGpvEByocWe3dFhBoWh1o

Malware Config

Targets

    • Target

      2024-09-20_01917d8ef944c6fda4666f67b4927d46_darkside

    • Size

      146KB

    • MD5

      01917d8ef944c6fda4666f67b4927d46

    • SHA1

      4b811bfc90504e935774457b002d785143804f24

    • SHA256

      9c09ece9784fad75103d9ecc51a7036dd1b9d6b9ddf945c580abc9e626e39d1a

    • SHA512

      395dd71cfc7be177f84e4be772f3ca869e7915c951cc183cb708deb0a464215b447901f1744f8c71d141481c4ca02f3ba53e69e1f43f73ff59307744ce05fa53

    • SSDEEP

      3072:p6glyuxE4GsUPnliByocWepjQ2d2jAhBHIWh1o:p6gDBGpvEByocWe3dFhBoWh1o

    • Renames multiple (336) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks