General
-
Target
Trojan-Ransom.Win32.Darkside.m-243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60.7z
-
Size
27KB
-
Sample
250325-tmceysyvg1
-
MD5
bc9a60e3d4259018a83f0344031734ed
-
SHA1
0e739230d538fed4efc4b4074cb67f6e363220db
-
SHA256
9eab4fb5f7a8336fe681cda5be1c8d443f248d7592022d248d2524eec9cdfdda
-
SHA512
6f641879ca22ca82bdb989c35beb29556987f089e244cadc7f399fb0a0d4de83b7194afbf85b27f140c7334e47f4aaa32b1d2e437b2c21321698536bfaee1957
-
SSDEEP
768:FE5N8GlaEDa2u+ncyIfX9Z4G+Vf/XssQDH4GN:FE5NFwEDabPwP8P4GN
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Darkside.m-243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60.7z
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Recovery\WindowsRE\README.8f290682.TXT
darkside
http://darksidfqzcuhtk2.onion/LYID3U99RAJSTEYEFWS6SLYDGMUXKNAT3OPKN9D56PIGX1QHBU5DHGUN4HGMX2IW
Targets
-
-
Target
Trojan-Ransom.Win32.Darkside.m-243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60.7z
-
Size
27KB
-
MD5
bc9a60e3d4259018a83f0344031734ed
-
SHA1
0e739230d538fed4efc4b4074cb67f6e363220db
-
SHA256
9eab4fb5f7a8336fe681cda5be1c8d443f248d7592022d248d2524eec9cdfdda
-
SHA512
6f641879ca22ca82bdb989c35beb29556987f089e244cadc7f399fb0a0d4de83b7194afbf85b27f140c7334e47f4aaa32b1d2e437b2c21321698536bfaee1957
-
SSDEEP
768:FE5N8GlaEDa2u+ncyIfX9Z4G+Vf/XssQDH4GN:FE5NFwEDabPwP8P4GN
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Renames multiple (140) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1