General

  • Target

    2024-06-20_b91ef02899b7f58d6464a02485e6628a_gandcrab

  • Size

    75KB

  • Sample

    240620-nm3z1syhpp

  • MD5

    b91ef02899b7f58d6464a02485e6628a

  • SHA1

    38914adf303574d56b50c31426bd717f1b3a080e

  • SHA256

    a0bc80cf3e14f0d97e5d8884dc1cb39d10d9f125b80a9a14648c9873e08408dd

  • SHA512

    329c9bbb260a9f8dfeaca2d132162b93565cfcb072db231872a4d57c5c514b0a81e6dd7ebb16dc81c710c391c93f59a88b1672bdbf259d259fcefab39ee9935f

  • SSDEEP

    1536:V55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:9MSjOnrmBTMqqDL2/mr3IdE8we0Avu5u

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-06-20_b91ef02899b7f58d6464a02485e6628a_gandcrab

    • Size

      75KB

    • MD5

      b91ef02899b7f58d6464a02485e6628a

    • SHA1

      38914adf303574d56b50c31426bd717f1b3a080e

    • SHA256

      a0bc80cf3e14f0d97e5d8884dc1cb39d10d9f125b80a9a14648c9873e08408dd

    • SHA512

      329c9bbb260a9f8dfeaca2d132162b93565cfcb072db231872a4d57c5c514b0a81e6dd7ebb16dc81c710c391c93f59a88b1672bdbf259d259fcefab39ee9935f

    • SSDEEP

      1536:V55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:9MSjOnrmBTMqqDL2/mr3IdE8we0Avu5u

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks