General

  • Target

    2024-06-27_f1758a4a9b000ba6f3e9c218fe9c4946_gandcrab

  • Size

    1.0MB

  • Sample

    240627-s7h8ka1alm

  • MD5

    f1758a4a9b000ba6f3e9c218fe9c4946

  • SHA1

    f4b74648459373335540baccbe60e880f8e461cc

  • SHA256

    701b51a0b69223abff8305249126ffbc7887eb2dbc38ff792d594f6b9df4a946

  • SHA512

    503ed45b6314bcc08a8c8522f4154b472a0d60af38363e7a98c8ea7188981c091a9ed068f156786559e2b5f306d8fbcde2384ec47c37d1d9fb0975b67e95785e

  • SSDEEP

    3072:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5r++ygLIaagvd:aXjOnr6gqqDL64vd

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-06-27_f1758a4a9b000ba6f3e9c218fe9c4946_gandcrab

    • Size

      1.0MB

    • MD5

      f1758a4a9b000ba6f3e9c218fe9c4946

    • SHA1

      f4b74648459373335540baccbe60e880f8e461cc

    • SHA256

      701b51a0b69223abff8305249126ffbc7887eb2dbc38ff792d594f6b9df4a946

    • SHA512

      503ed45b6314bcc08a8c8522f4154b472a0d60af38363e7a98c8ea7188981c091a9ed068f156786559e2b5f306d8fbcde2384ec47c37d1d9fb0975b67e95785e

    • SSDEEP

      3072:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5r++ygLIaagvd:aXjOnr6gqqDL64vd

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks