General

  • Target

    2024-12-31_eb514bb7e05e3132577b27b265010021_darkside

  • Size

    148KB

  • Sample

    241231-ar6d2swjem

  • MD5

    eb514bb7e05e3132577b27b265010021

  • SHA1

    b8409f7752938d861eff70114424aa933cfb70d8

  • SHA256

    9258e8b4ac7642dc20d76e03acb67198eb6ccfb181f9a23a94ea3d4024dd3a13

  • SHA512

    874831f03fbc8f0bf51dd6eee28c17af3b80de7869656a521b24947cf45164ff4ed9099efb82af7b607f702811e0935aeb33e54f7b3c372dd2c0aa247b92344c

  • SSDEEP

    1536:9zICS4AwwRlcz5AxE4vGP1iU8KnliIs3iocZMgkGJp1+aASjr9pntaAHwQmMPmIa:u6glyuxE4GsUPnliByocWepMaAE1rHp

Malware Config

Extracted

Path

C:\JBZxC9GYi.README.txt

Ransom Note
******************************************************************************************** ************************ Your data are stolen and encrypted **************************** 1. How to contact? * 1. You can use tox: https://qtox.github.io/ send message to us. Tox ID : E39D0A412302DF31B24613AA88D5859A5432A5FCBAD25917E93DA84D56CB411F88119E8AEB78 * 2. You can send email to us, Email address : [email protected] Suggestion : Contact us in two ways at the same time, if you haven't received a reply to your email, please check your spam folder. 2. How to view leaked data? * 1. Download Tor Browser: https://www.torproject.org/download darkness website can noly visit use tor. * 2. Click connect button to connect Tor internet * 3. Visit: http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/ 3. What guarantees that we will not deceive you? * We are not a politically motivated group and we do not need anything other than your money If you pay, we will provide you the programs for decryption and we will delete your data. * If we do not give you decrypters or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. * We attack the hundreds of companies and there is no dissatisfied victim after payment. 4. What happens if you do not pay? * If you don't pay, the data will be sold on auction platform after 72 hours, data will be bought by your competitors, and we will report your company fail to protect data as a result of a data breach to the data protection authority in your country, you could face significant fines. * Do not hesitate for a long time, the sooner pay, the sooner your company will be safe. * If you pay, we will delete data immediately, we can also provide you an paid hacking services. You can pay for the services after the hacking is successful. Please trust our strength. 5. Warning! * Do not DELETE or MODIFY any files, it can lead to recovery problems! * If you do not pay the ransom we will attack your company repeatedly again! *** Your DECRYPTION ID: 030D4BF7EBD5712A0B379597C625953A ************************ Your data are stolen and encrypted ************************** ******************************************************************************************
URLs

https://qtox.github.io/

http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/

Extracted

Path

C:\JBZxC9GYi.README.txt

Ransom Note
******************************************************************************************** ************************ Your data are stolen and encrypted **************************** 1. How to contact? * 1. You can use tox: https://qtox.github.io/ send message to us. Tox ID : E39D0A412302DF31B24613AA88D5859A5432A5FCBAD25917E93DA84D56CB411F88119E8AEB78 * 2. You can send email to us, Email address : [email protected] Suggestion : Contact us in two ways at the same time, if you haven't received a reply to your email, please check your spam folder. 2. How to view leaked data? * 1. Download Tor Browser: https://www.torproject.org/download darkness website can noly visit use tor. * 2. Click connect button to connect Tor internet * 3. Visit: http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/ 3. What guarantees that we will not deceive you? * We are not a politically motivated group and we do not need anything other than your money If you pay, we will provide you the programs for decryption and we will delete your data. * If we do not give you decrypters or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. * We attack the hundreds of companies and there is no dissatisfied victim after payment. 4. What happens if you do not pay? * If you don't pay, the data will be sold on auction platform after 72 hours, data will be bought by your competitors, and we will report your company fail to protect data as a result of a data breach to the data protection authority in your country, you could face significant fines. * Do not hesitate for a long time, the sooner pay, the sooner your company will be safe. * If you pay, we will delete data immediately, we can also provide you an paid hacking services. You can pay for the services after the hacking is successful. Please trust our strength. 5. Warning! * Do not DELETE or MODIFY any files, it can lead to recovery problems! * If you do not pay the ransom we will attack your company repeatedly again! *** Your DECRYPTION ID: 030D4BF7EBD5712AAB299637FCAD415A ************************ Your data are stolen and encrypted ************************** ******************************************************************************************
URLs

https://qtox.github.io/

http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/

Targets

    • Target

      2024-12-31_eb514bb7e05e3132577b27b265010021_darkside

    • Size

      148KB

    • MD5

      eb514bb7e05e3132577b27b265010021

    • SHA1

      b8409f7752938d861eff70114424aa933cfb70d8

    • SHA256

      9258e8b4ac7642dc20d76e03acb67198eb6ccfb181f9a23a94ea3d4024dd3a13

    • SHA512

      874831f03fbc8f0bf51dd6eee28c17af3b80de7869656a521b24947cf45164ff4ed9099efb82af7b607f702811e0935aeb33e54f7b3c372dd2c0aa247b92344c

    • SSDEEP

      1536:9zICS4AwwRlcz5AxE4vGP1iU8KnliIs3iocZMgkGJp1+aASjr9pntaAHwQmMPmIa:u6glyuxE4GsUPnliByocWepMaAE1rHp

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Renames multiple (7712) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks