General

  • Target

    19022025_0655_sample.exe

  • Size

    62KB

  • Sample

    250219-hpn1zszmex

  • MD5

    bf41fc54f96d0106d34f1c48827006e4

  • SHA1

    cb998d02179f514a537f660046f5014f587fadd8

  • SHA256

    1b9d3728a2c489d4166e8752525c88cf532db6409cf1147d6955ab4302c89b48

  • SHA512

    d061cb6d31a4dab3aaefb7334347566d7678a48fd16d8db5e7ba55142884d50822b4e5877b5de8a14550f125aba13a947514aa789104aac9c538bbd865ea5b54

  • SSDEEP

    1536:Ncw2LbyC+HX4fWEsAWyuAlfV/0Hjpl0PMRmIPT1c/ebioQ+Cf:ND5fHo+9ZyPRViL0PwPof

Malware Config

Extracted

Path

C:\Users\Admin\Contacts\README.8746624d.TXT

Family

darkside

Ransom Note
----------- [ Welcome to Dark Side] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. Data leak ---------------------------------------------- First of all we have uploaded more then 100 GB data. Example of data: - Accounting data - Executive data - Sales data - Customer Support data - Marketing data - Quality data - And more other... Your personal leak page: http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC The data is preloaded and will be automatically published if you do not pay. After publication, your data will be available for at least 6 months on our tor cdn servers. We are ready: - To provide you the evidence of stolen data - To give you universal decrypting tool for all encrypted files. - To delete all the stolen data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68 When you open our website, put the following data in the input form: Key: pr9gzRnMz6qEwr6ovMT0cbjd9yT56NctfQZGIiVVLgo0ME2EQpAUyZucG9BLrOJjno5XLPvCN11TFfnlFHa42u5mJxoeR5k5RUgQAC1MC6LBUj4YOOAUyiBrR HQSUM3pzGoEPRVOzXSZ8YqkJyFL0TDFBbWaBKQDOSo9GzKKoVRQ0Eb02F5geTPkTAqZZSfSQ6PBBlTGPSgGe2kCyuwwp7lDmRSJlNnHssMMZHVhXzyZ6fxiBY gNiuusFK8JNI5nrtRPp3bMAc6OEddxfJWj6o2GT1Xg9j87Jp4Oyv43E1J61jLJAWBkmoBB3Gqv07mtyDW5PnmxBlNzABbLFEvJMQL23sR8nnw4svzcZHxrqD1 xRcxqyeKtsaQ5yqLvyQgMdnrI2QoCqkHYYUfBIzjO8BXyBZdmjHanXE57jdDAhjaDUUqfL917cCyJr1uwVR0Xj5lJXe8BIKHd3dFrz70CsIXFAhicOsBlFzIn daNcAXXyL8Fg1avIXOcuEkGRDXt8Cs8b3TAB6n4DrbLJdiFjECo8yCA9pxvzqjXatumUloblWFZaUoLVYzP !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC

http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68

Targets

    • Target

      19022025_0655_sample.exe

    • Size

      62KB

    • MD5

      bf41fc54f96d0106d34f1c48827006e4

    • SHA1

      cb998d02179f514a537f660046f5014f587fadd8

    • SHA256

      1b9d3728a2c489d4166e8752525c88cf532db6409cf1147d6955ab4302c89b48

    • SHA512

      d061cb6d31a4dab3aaefb7334347566d7678a48fd16d8db5e7ba55142884d50822b4e5877b5de8a14550f125aba13a947514aa789104aac9c538bbd865ea5b54

    • SSDEEP

      1536:Ncw2LbyC+HX4fWEsAWyuAlfV/0Hjpl0PMRmIPT1c/ebioQ+Cf:ND5fHo+9ZyPRViL0PwPof

    • DarkSide

      Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

    • Darkside family

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks