General
-
Target
2025-01-31_ab877999ca6168fd099040f98a64edc6_darkside
-
Size
147KB
-
Sample
250131-l5mpmsvldj
-
MD5
ab877999ca6168fd099040f98a64edc6
-
SHA1
c530d7246fb5a00d09ed53c84e6ed1513af929ad
-
SHA256
e5aca3c506667dc2b0a0f35c8597fd6f80c3ee852a88400f0f7f727ae8666295
-
SHA512
a5431e6519c46d451c5224c289978da04e3c84ffdbc79203fe8f70850629a55b3a493dfec493c1588d73963944cb42bacb05780bafc41a08383b5fe5bf9d6e88
-
SSDEEP
3072:Z6glyuxE4GsUPnliByocWepajomS/nF4pxmI:Z6gDBGpvEByocWe+dOF
Behavioral task
behavioral1
Sample
2025-01-31_ab877999ca6168fd099040f98a64edc6_darkside.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-31_ab877999ca6168fd099040f98a64edc6_darkside.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
C:\RDYzae88l.README.txt
Extracted
C:\RDYzae88l.README.txt
Targets
-
-
Target
2025-01-31_ab877999ca6168fd099040f98a64edc6_darkside
-
Size
147KB
-
MD5
ab877999ca6168fd099040f98a64edc6
-
SHA1
c530d7246fb5a00d09ed53c84e6ed1513af929ad
-
SHA256
e5aca3c506667dc2b0a0f35c8597fd6f80c3ee852a88400f0f7f727ae8666295
-
SHA512
a5431e6519c46d451c5224c289978da04e3c84ffdbc79203fe8f70850629a55b3a493dfec493c1588d73963944cb42bacb05780bafc41a08383b5fe5bf9d6e88
-
SSDEEP
3072:Z6glyuxE4GsUPnliByocWepajomS/nF4pxmI:Z6gDBGpvEByocWe+dOF
Score10/10-
Renames multiple (327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-