General

  • Target

    2024-06-17_943754c529d77329af83d3fe3b1c43c2_gandcrab

  • Size

    73KB

  • Sample

    240617-hmzdyaygnh

  • MD5

    943754c529d77329af83d3fe3b1c43c2

  • SHA1

    dd35c3969bf3228ec1c7e8640db3aedacb3ab427

  • SHA256

    16a76deac7a62b0e45be812844e53e75a7abcd0f4da420f9ee0efae36912ee63

  • SHA512

    d50ae7167b9237f443231a78db8a16aa3622f33fbebfc928327b4d6afe9fb77a5440b1ea32de4e3333218276f3a30fbd19bad17326eb3c8deadfa097cd574921

  • SSDEEP

    1536:255u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:8MSjOnrmBTMqqDL2/mr3IdE8we0Avu5F

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-06-17_943754c529d77329af83d3fe3b1c43c2_gandcrab

    • Size

      73KB

    • MD5

      943754c529d77329af83d3fe3b1c43c2

    • SHA1

      dd35c3969bf3228ec1c7e8640db3aedacb3ab427

    • SHA256

      16a76deac7a62b0e45be812844e53e75a7abcd0f4da420f9ee0efae36912ee63

    • SHA512

      d50ae7167b9237f443231a78db8a16aa3622f33fbebfc928327b4d6afe9fb77a5440b1ea32de4e3333218276f3a30fbd19bad17326eb3c8deadfa097cd574921

    • SSDEEP

      1536:255u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:8MSjOnrmBTMqqDL2/mr3IdE8we0Avu5F

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks