General
-
Target
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside
-
Size
56KB
-
Sample
250125-hbdcbszpes
-
MD5
76cd4ed788d30ec46dd5132f4b6f0896
-
SHA1
c86cd694c190d04583d601ae19fe7685f34d81f2
-
SHA256
b7347f1b54771f8803b37a6d82c0adebda1ccbbc0eadcc3a5d66c6953b94a625
-
SHA512
e35f03faec3e02c3ef9cc6fbf666f41f95fda76f6a9d5880dd1e429ba504f2c12307d16c30c95e00cadefb261d4a2a3c83b0c1392d55aad9e0881d8b41bc63e6
-
SSDEEP
768:2iN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/AfyJMIaJ/ZB49j9xOOLd9kvAx0:h4HHerjZX7pLrJKjSO5i
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Recovery\README.d926ccd5.TXT
darkside
http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/162/thedixiegroup/LCfyHRcwffrYTblpZvoPO3XDbrYPcNu0wVAsH5p49LSjBfzTmtdXT48azXFlMu7q
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/W57MRI9C7YZJUZEABBBYRQLSUTG22JZ9MAH0WT1ISHC405KP7Z2UWY3AI3J68DNM
Targets
-
-
Target
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside
-
Size
56KB
-
MD5
76cd4ed788d30ec46dd5132f4b6f0896
-
SHA1
c86cd694c190d04583d601ae19fe7685f34d81f2
-
SHA256
b7347f1b54771f8803b37a6d82c0adebda1ccbbc0eadcc3a5d66c6953b94a625
-
SHA512
e35f03faec3e02c3ef9cc6fbf666f41f95fda76f6a9d5880dd1e429ba504f2c12307d16c30c95e00cadefb261d4a2a3c83b0c1392d55aad9e0881d8b41bc63e6
-
SSDEEP
768:2iN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/AfyJMIaJ/ZB49j9xOOLd9kvAx0:h4HHerjZX7pLrJKjSO5i
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Renames multiple (153) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-