General
-
Target
2024-12-31_eb514bb7e05e3132577b27b265010021_darkside
-
Size
148KB
-
Sample
241231-at25eaymd1
-
MD5
eb514bb7e05e3132577b27b265010021
-
SHA1
b8409f7752938d861eff70114424aa933cfb70d8
-
SHA256
9258e8b4ac7642dc20d76e03acb67198eb6ccfb181f9a23a94ea3d4024dd3a13
-
SHA512
874831f03fbc8f0bf51dd6eee28c17af3b80de7869656a521b24947cf45164ff4ed9099efb82af7b607f702811e0935aeb33e54f7b3c372dd2c0aa247b92344c
-
SSDEEP
1536:9zICS4AwwRlcz5AxE4vGP1iU8KnliIs3iocZMgkGJp1+aASjr9pntaAHwQmMPmIa:u6glyuxE4GsUPnliByocWepMaAE1rHp
Behavioral task
behavioral1
Sample
2024-12-31_eb514bb7e05e3132577b27b265010021_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-31_eb514bb7e05e3132577b27b265010021_darkside.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\JBZxC9GYi.README.txt
https://qtox.github.io/
http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/
Extracted
C:\JBZxC9GYi.README.txt
https://qtox.github.io/
http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/
Targets
-
-
Target
2024-12-31_eb514bb7e05e3132577b27b265010021_darkside
-
Size
148KB
-
MD5
eb514bb7e05e3132577b27b265010021
-
SHA1
b8409f7752938d861eff70114424aa933cfb70d8
-
SHA256
9258e8b4ac7642dc20d76e03acb67198eb6ccfb181f9a23a94ea3d4024dd3a13
-
SHA512
874831f03fbc8f0bf51dd6eee28c17af3b80de7869656a521b24947cf45164ff4ed9099efb82af7b607f702811e0935aeb33e54f7b3c372dd2c0aa247b92344c
-
SSDEEP
1536:9zICS4AwwRlcz5AxE4vGP1iU8KnliIs3iocZMgkGJp1+aASjr9pntaAHwQmMPmIa:u6glyuxE4GsUPnliByocWepMaAE1rHp
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Renames multiple (7730) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-