General

  • Target

    de3f9c62fe04c71b45e77be7c961bba8b56054aa3daa450148caf66d3295f345

  • Size

    244KB

  • Sample

    210518-gb4yjgbxfa

  • MD5

    11dc1e3e40b62a3958213d0781978db3

  • SHA1

    f10eea04b13e02b85216bd33750a899e3a873d0e

  • SHA256

    de3f9c62fe04c71b45e77be7c961bba8b56054aa3daa450148caf66d3295f345

  • SHA512

    a1b9613b045bcf9633d13940f5e66305223c60e3c98e098f9b69b457d1936b1270668e710fb32cc7760b4f57067d63cf0c30f9b99cd021a3670455e5de448a4e

Malware Config

Targets

    • Target

      de3f9c62fe04c71b45e77be7c961bba8b56054aa3daa450148caf66d3295f345

    • Size

      244KB

    • MD5

      11dc1e3e40b62a3958213d0781978db3

    • SHA1

      f10eea04b13e02b85216bd33750a899e3a873d0e

    • SHA256

      de3f9c62fe04c71b45e77be7c961bba8b56054aa3daa450148caf66d3295f345

    • SHA512

      a1b9613b045bcf9633d13940f5e66305223c60e3c98e098f9b69b457d1936b1270668e710fb32cc7760b4f57067d63cf0c30f9b99cd021a3670455e5de448a4e

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks