General

  • Target

    2024-11-12_b2cb742a43762106fc03fa1e26fd4f68_darkside

  • Size

    145KB

  • Sample

    241112-e5pexavfqf

  • MD5

    b2cb742a43762106fc03fa1e26fd4f68

  • SHA1

    aef4e9199b06b835b6e677c0910d3ed6fdf96ef3

  • SHA256

    f4dcf20fcdd95d241eadcd88ce30998189d0682132456e9254321a8d6d281611

  • SHA512

    d0521e8a496e53a309acf7f9d388e684bfa068cc77d23ae6a7da75e6dea962b2a9e3dd5a27dc5e45c054aa025e3ff1a3c237a996aab2fbcfaa68483481ca4975

  • SSDEEP

    3072:5qJogYkcSNm9V7D58PleQQuloQwssCnT:5q2kc4m9tDcQvuiQfD

Malware Config

Targets

    • Target

      2024-11-12_b2cb742a43762106fc03fa1e26fd4f68_darkside

    • Size

      145KB

    • MD5

      b2cb742a43762106fc03fa1e26fd4f68

    • SHA1

      aef4e9199b06b835b6e677c0910d3ed6fdf96ef3

    • SHA256

      f4dcf20fcdd95d241eadcd88ce30998189d0682132456e9254321a8d6d281611

    • SHA512

      d0521e8a496e53a309acf7f9d388e684bfa068cc77d23ae6a7da75e6dea962b2a9e3dd5a27dc5e45c054aa025e3ff1a3c237a996aab2fbcfaa68483481ca4975

    • SSDEEP

      3072:5qJogYkcSNm9V7D58PleQQuloQwssCnT:5q2kc4m9tDcQvuiQfD

    • Renames multiple (354) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks