General

  • Target

    2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside

  • Size

    150KB

  • Sample

    241231-mhw58sylgk

  • MD5

    f24ce79d82b9bf5196870d70b397c885

  • SHA1

    d12defeab969c6e033b043b7061d85aab68cd165

  • SHA256

    635c74ec2d6f50ddab0a1ee3a28fa54b459b73efb5af47993a99714beaecfbc3

  • SHA512

    b54b5df4343309fc8cc75bc4038b49e1cb409d7a0f4ac2676f4e5636575c9cbb8412aa25f01db1404031ce910f654e324daaa06b17eddb60f9dfae9e24009bd8

  • SSDEEP

    3072:F6glyuxE4GsUPnliByocWepHHPUwTAyeM+Sr/:F6gDBGpvEByocWeNHfTA0x/

Malware Config

Extracted

Path

C:\8bTDEWLVO.README.txt

Ransom Note
X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X + Welcome to + + + + ||||| ||||| | | ||||| ||||||| ||||| | | ||||| + + | | | | | | | | | | | | | | || + + | ||||| | ||||| | | | | | | | | + + | | | | | | | | | | || | | || + + | | | | | | | | | | | | | || + + ||||| | | | | | ||||| ||||| | | ||||| + + + + services + X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X + DO NOT: + + --Modify, rename, copy or move any files or + + you can DAMAGE them and decryption will be impossible. + + --Use any third-party or public Decryption software, it also may DAMAGE files. + + --Shutdown or Reset your system, it can DAMAGE files. + + --Hire any third-party negotiators (recovery|police and etc). + X--------------------------------------------------------------------------------------X + We've also downloaded your most important data just in case. + + If you don't pay, it will be released to the media + + and|or sold to any third party. + X--------------------------------------------------------------------------------------X + 1) WHAT TO DO: + + -> You must contact us as soon as possible (you will find contacts below) + + -> You must purchase our tool for a SMALL fee, so you can recover your files. + + Without our decryption keys this is not possible + + -> You must make a deal with us to avoid leaking your data + + + + 2) YOUR OPTIONS: + + -> IF THERE IS NO CONTACT OR THE DEAL IS DONE WITHIN 3 DAYS: + + The decryption key will be permanently deleted, and recovery will be impossible. + + All your data will be published and|or sold to any third parties. + + Information about vulnerabilities in your network, may be published and|or sold + + + + -> IF WE MAKE A DEAL: + + We will provide you with a decryption key and manual. + + We will delete all your files from our file storage with proof of deletion. + + We guarantee that we will not share any details with third parties + + We will provide you with a attack vector and a list of security recommendations + X--------------------------------------------------------------------------------------X + Contact us + + -> [email protected] + + -> [email protected] + + Your personal DECRYPTION ID: VISIO + X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X

Targets

    • Target

      2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside

    • Size

      150KB

    • MD5

      f24ce79d82b9bf5196870d70b397c885

    • SHA1

      d12defeab969c6e033b043b7061d85aab68cd165

    • SHA256

      635c74ec2d6f50ddab0a1ee3a28fa54b459b73efb5af47993a99714beaecfbc3

    • SHA512

      b54b5df4343309fc8cc75bc4038b49e1cb409d7a0f4ac2676f4e5636575c9cbb8412aa25f01db1404031ce910f654e324daaa06b17eddb60f9dfae9e24009bd8

    • SSDEEP

      3072:F6glyuxE4GsUPnliByocWepHHPUwTAyeM+Sr/:F6gDBGpvEByocWeNHfTA0x/

    • Renames multiple (343) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks