General

  • Target

    http://web.whastapp.com

  • Sample

    240621-xct4sstcmn

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-3665033694-1447845302-680750983-1000\YQWNB-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .YQWNB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/1af392cc177c695c | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/1af392cc177c695c

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-3665033694-1447845302-680750983-1000\IKFOLIOM-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .IKFOLIOM The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/1af392cc177c695c | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/1af392cc177c695c

Targets

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Renames multiple (339) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Active Setup

1
T1547.014

Event Triggered Execution

2
T1546

Image File Execution Options Injection

1
T1546.012

Component Object Model Hijacking

1
T1546.015

Defense Evasion

Modify Registry

4
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

8
T1012

System Information Discovery

8
T1082

Software Discovery

1
T1518

Security Software Discovery

1
T1518.001

Network Service Discovery

1
T1046

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Defacement

1
T1491

Tasks