Resubmissions

05-02-2025 08:46

250205-kpg9jszrhq 10

25-01-2025 06:33

250125-hbdcbszpes 10

General

  • Target

    2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside

  • Size

    56KB

  • Sample

    250205-kpg9jszrhq

  • MD5

    76cd4ed788d30ec46dd5132f4b6f0896

  • SHA1

    c86cd694c190d04583d601ae19fe7685f34d81f2

  • SHA256

    b7347f1b54771f8803b37a6d82c0adebda1ccbbc0eadcc3a5d66c6953b94a625

  • SHA512

    e35f03faec3e02c3ef9cc6fbf666f41f95fda76f6a9d5880dd1e429ba504f2c12307d16c30c95e00cadefb261d4a2a3c83b0c1392d55aad9e0881d8b41bc63e6

  • SSDEEP

    768:2iN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/AfyJMIaJ/ZB49j9xOOLd9kvAx0:h4HHerjZX7pLrJKjSO5i

Malware Config

Extracted

Path

C:\Recovery\README.5c4c76da.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. Data leak ---------------------------------------------- First of all we have downloaded more then 500GB data from your network. Included: -Accounting data -Finance data -HR -Employees confidential data(photos, benefits, taxes, etc) -Marketing -Budgets -Taxes(sales tax compliance, property, income and franchise taxes, etc) -Payrolls -Banking data -Arbitration -Scans -Insurance -Reconciliations -Reports(monthly bank inventory, monthly financial, claims reports, etc) -Audits(DHG, insurance audits, etc) -B2B clients config data -Confidentiality 2020 -2020, 2021 Business plans -2019, 2020, 2021 years Closing (full dumps) -and a lot of other sensitive data Your personal leak page: http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/162/thedixiegroup/LCfyHRcwffrYTblpZvoPO3XDbrYPcNu0wVAsH5p49LSjBfzTmtdXT48azXFlMu7q On the page you will find examples of files that have been downloaded. The data is preloaded and will be automatically published if you do not pay. After publication, your data will be available for at least 6 months on our tor cdn servers. We are ready: - To provide you the evidence of stolen data - To delete all the stolen data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/W57MRI9C7YZJUZEABBBYRQLSUTG22JZ9MAH0WT1ISHC405KP7Z2UWY3AI3J68DNM When you open our website, put the following data in the input form: Key: ug8lgpX3WrFzlEJ6HBWlwJnf7jemhfnlxBw9porj1uuYFTgKbxJQJLYiteQS7DwgZn7dH0fs7qPPWmZ6inPv5GTmSJZNAjGLVIjd4SoiyTdGyophf0zPBxx6uEAOJxM0Woo4ZGeKVoUDHtZsqZNnhMF7aPh54VnKpIJXiZDbZZw4P06xTuw1UMeiTE7wdg7HWZMepAVTzEI2W04RbkPFQHfUgEDcslDxbr83BvopYTYGKFRmtNUMH8OsOZQrOtv50xWDaOfbqxbzfHMJm30QGaGpgylJHQZsscz3XBnwIdvlwBJ9KN4DVgFgziRdvwJrfCP6YN1CYTOQgw1rzqmIU4G1xGYv7rE3jiBY1s4D3Y26SbppTceAVMu1mKx5CFIE3EbtcAsNtEqLHDbPnMCvU6Apwp17TXGob8xXJpEDBZhIzdTaCuybcprwcFNTOzccjbIH81W39MrcJi9mNO3kHRe5fxmIFKvc9v8aQDihGyC65DtdabyBjidXI1NyNONT4PTyrxYqgffPsNDFuzz2yMrXiTAwtAQPqny5BBJQsfVhpLXTtnLvWg1 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/162/thedixiegroup/LCfyHRcwffrYTblpZvoPO3XDbrYPcNu0wVAsH5p49LSjBfzTmtdXT48azXFlMu7q

http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/W57MRI9C7YZJUZEABBBYRQLSUTG22JZ9MAH0WT1ISHC405KP7Z2UWY3AI3J68DNM

Targets

    • Target

      2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside

    • Size

      56KB

    • MD5

      76cd4ed788d30ec46dd5132f4b6f0896

    • SHA1

      c86cd694c190d04583d601ae19fe7685f34d81f2

    • SHA256

      b7347f1b54771f8803b37a6d82c0adebda1ccbbc0eadcc3a5d66c6953b94a625

    • SHA512

      e35f03faec3e02c3ef9cc6fbf666f41f95fda76f6a9d5880dd1e429ba504f2c12307d16c30c95e00cadefb261d4a2a3c83b0c1392d55aad9e0881d8b41bc63e6

    • SSDEEP

      768:2iN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/AfyJMIaJ/ZB49j9xOOLd9kvAx0:h4HHerjZX7pLrJKjSO5i

    • DarkSide

      Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

    • Darkside family

    • Renames multiple (153) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks