General

  • Target

    2025-01-28_dbd1e940cb5d2d3ded216a7a55e43d85_darkside

  • Size

    146KB

  • Sample

    250128-vgj4aayjcr

  • MD5

    dbd1e940cb5d2d3ded216a7a55e43d85

  • SHA1

    833e046616354a1c9d260aec6cd40d8477ab1012

  • SHA256

    e7df8e3297b3daa23d6633c9a87db2f05be14a0e45338bc3ff170f934cec6dd8

  • SHA512

    166d04c074f8ec6241ac04434a8ea473ab855b6aeca3c9b438147451315b582dd2572399c18335e053ebc20e9f65c43f6b6ba3018aa330c6ec334d6b6b0baad6

  • SSDEEP

    1536:ZzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xD6mZlyPvJfHTbM8myFolkNstUyz:iqJogYkcSNm9V7D6mZl2vJ/8zlastT

Malware Config

Targets

    • Target

      2025-01-28_dbd1e940cb5d2d3ded216a7a55e43d85_darkside

    • Size

      146KB

    • MD5

      dbd1e940cb5d2d3ded216a7a55e43d85

    • SHA1

      833e046616354a1c9d260aec6cd40d8477ab1012

    • SHA256

      e7df8e3297b3daa23d6633c9a87db2f05be14a0e45338bc3ff170f934cec6dd8

    • SHA512

      166d04c074f8ec6241ac04434a8ea473ab855b6aeca3c9b438147451315b582dd2572399c18335e053ebc20e9f65c43f6b6ba3018aa330c6ec334d6b6b0baad6

    • SSDEEP

      1536:ZzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xD6mZlyPvJfHTbM8myFolkNstUyz:iqJogYkcSNm9V7D6mZl2vJ/8zlastT

    • Renames multiple (341) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks