General
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.zip
-
Size
28KB
-
Sample
250110-lnaczssrdn
-
MD5
d0a7b7c20e34212ca7ee5dfb5850631d
-
SHA1
59faa285900b89d7fb3a99e3fdd66a8a4abb5c4f
-
SHA256
2334559b1d0e613a9b5220a7b5107193e5fbaa2db3b251db3832432a4510feb9
-
SHA512
7c123611808858013da2616bac875478fef1e29bb1b2d99d03ee4d3fe58b22ac7eead9ef7d53d5620cd84f044d40500d4d7d157971a62bb0de128f87890b5b9c
-
SSDEEP
384:uTU5pm1dnB4usdMFvGh5JeM/n6cAldAySCJpTFOxuI9QBmk/RjnhpaGr7rYu2c36:uNtsYvoVzIBwkJThQG8/Qcd3h
Static task
static1
Behavioral task
behavioral1
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Recovery\How To Restore Your Files.txt
darkside
Targets
-
-
Target
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f.exe
-
Size
79KB
-
MD5
f9afb31bc17811e5ab4fa406f105b1fe
-
SHA1
d1a9449dcc8a3aa0c887bce71f128866175f679a
-
SHA256
01c647838c374e91e8f9fe967fd25235d72264414bb0d5b82c4fbd4151a9717f
-
SHA512
6feca3dfa221b704208754e67bcdce02a2253961da098b3e376d11217cd00b9f77e42f37f242e1a1f4b759b5fd172c29c9f153fce32eace48e07e802aff40b55
-
SSDEEP
1536:SX6UhZM4hubesrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2zs4:uhZ5YesrQLOJgY8Zp8LHD4XWaNH71dLI
-
Babuk family
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (188) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-