Overview
overview
10Static
static
32025-01-25...de.exe
windows7-x64
32025-01-25...de.exe
windows10-2004-x64
102025-01-25...de.exe
android-9-x86
2025-01-25...de.exe
android-13-x64
2025-01-25...de.exe
macos-10.15-amd64
2025-01-25...de.exe
ubuntu-18.04-amd64
2025-01-25...de.exe
debian-9-armhf
2025-01-25...de.exe
debian-9-mips
2025-01-25...de.exe
debian-9-mipsel
General
-
Target
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside
-
Size
56KB
-
Sample
250205-kpg9jszrhq
-
MD5
76cd4ed788d30ec46dd5132f4b6f0896
-
SHA1
c86cd694c190d04583d601ae19fe7685f34d81f2
-
SHA256
b7347f1b54771f8803b37a6d82c0adebda1ccbbc0eadcc3a5d66c6953b94a625
-
SHA512
e35f03faec3e02c3ef9cc6fbf666f41f95fda76f6a9d5880dd1e429ba504f2c12307d16c30c95e00cadefb261d4a2a3c83b0c1392d55aad9e0881d8b41bc63e6
-
SSDEEP
768:2iN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/AfyJMIaJ/ZB49j9xOOLd9kvAx0:h4HHerjZX7pLrJKjSO5i
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral8
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside.exe
Resource
debian9-mipsel-20240418-en
Malware Config
Extracted
C:\Recovery\README.5c4c76da.TXT
darkside
http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/162/thedixiegroup/LCfyHRcwffrYTblpZvoPO3XDbrYPcNu0wVAsH5p49LSjBfzTmtdXT48azXFlMu7q
http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/W57MRI9C7YZJUZEABBBYRQLSUTG22JZ9MAH0WT1ISHC405KP7Z2UWY3AI3J68DNM
Targets
-
-
Target
2025-01-25_76cd4ed788d30ec46dd5132f4b6f0896_darkside
-
Size
56KB
-
MD5
76cd4ed788d30ec46dd5132f4b6f0896
-
SHA1
c86cd694c190d04583d601ae19fe7685f34d81f2
-
SHA256
b7347f1b54771f8803b37a6d82c0adebda1ccbbc0eadcc3a5d66c6953b94a625
-
SHA512
e35f03faec3e02c3ef9cc6fbf666f41f95fda76f6a9d5880dd1e429ba504f2c12307d16c30c95e00cadefb261d4a2a3c83b0c1392d55aad9e0881d8b41bc63e6
-
SSDEEP
768:2iN4q1eksgR4SiI+rxQ3rjFrXRRWxXyw/AfyJMIaJ/ZB49j9xOOLd9kvAx0:h4HHerjZX7pLrJKjSO5i
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Renames multiple (153) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-