General

  • Target

    2024-07-02_6a4b5ec4af2651bdf359c1fd03efb34c_gandcrab

  • Size

    76KB

  • Sample

    240702-f2nvmsxfrg

  • MD5

    6a4b5ec4af2651bdf359c1fd03efb34c

  • SHA1

    939bc458c7fd0fd7218194efab7883f13f573ef5

  • SHA256

    0a750955d0aa7b444066a2e1ae290e688d4dd534b91a7c092d67c3940e80acfd

  • SHA512

    ba3acd730c049b309726b63b9c87536a57d33cf35ae35648cc60b80463be0b7eba7c3771ec01ed2ba180a5b3493190f1c691200b5b18b4c1d1e9e0762ea9cdb6

  • SSDEEP

    1536:j55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r5:/MSjOnrmBTMqqDL2/mr3IdE8we0Avu5V

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-07-02_6a4b5ec4af2651bdf359c1fd03efb34c_gandcrab

    • Size

      76KB

    • MD5

      6a4b5ec4af2651bdf359c1fd03efb34c

    • SHA1

      939bc458c7fd0fd7218194efab7883f13f573ef5

    • SHA256

      0a750955d0aa7b444066a2e1ae290e688d4dd534b91a7c092d67c3940e80acfd

    • SHA512

      ba3acd730c049b309726b63b9c87536a57d33cf35ae35648cc60b80463be0b7eba7c3771ec01ed2ba180a5b3493190f1c691200b5b18b4c1d1e9e0762ea9cdb6

    • SSDEEP

      1536:j55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r5:/MSjOnrmBTMqqDL2/mr3IdE8we0Avu5V

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks