General
-
Target
sample3.exe
-
Size
59KB
-
Sample
250401-e8pvvattay
-
MD5
943a107b88f85fd88198a9df2e1dc0dd
-
SHA1
bfcf6050ddba6053b738e0c5e54b105880a3c45a
-
SHA256
80c75581d6e09643a8fc7d7e0fa677e95faa64f20141cf493371ea604f6a07c9
-
SHA512
bb179e1deb929502a63d37a19f34808329cb0a5f85618aafcc1eb22ecd91966f12c0033c36a84d966c84dfa86172b0af352e10a086f337f404af34256caacf77
-
SSDEEP
768:GjjmbIax7F3DS4/S9+CuUSbVAdNcxGV1ylvD7Y23W58:Dx7Fu4/ihrhDTV1ylbcZ58
Static task
static1
Behavioral task
behavioral1
Sample
sample3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
sample3.exe
Resource
win11-20250313-en
Malware Config
Extracted
C:\Recovery\WindowsRE\README.8f290682.TXT
darkside
http://darksidfqzcuhtk2.onion/CZEX8E0GR0AO4ASUCJE1K824OKJA1G24B8B3G0P84LJTTE7W8EC86JBE7NBXLMRT
Targets
-
-
Target
sample3.exe
-
Size
59KB
-
MD5
943a107b88f85fd88198a9df2e1dc0dd
-
SHA1
bfcf6050ddba6053b738e0c5e54b105880a3c45a
-
SHA256
80c75581d6e09643a8fc7d7e0fa677e95faa64f20141cf493371ea604f6a07c9
-
SHA512
bb179e1deb929502a63d37a19f34808329cb0a5f85618aafcc1eb22ecd91966f12c0033c36a84d966c84dfa86172b0af352e10a086f337f404af34256caacf77
-
SSDEEP
768:GjjmbIax7F3DS4/S9+CuUSbVAdNcxGV1ylvD7Y23W58:Dx7Fu4/ihrhDTV1ylbcZ58
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Renames multiple (151) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1