General

  • Target

    6be34c06ba421a032634c564a1bf298406d7027adf684ec142c5039b6f46d224

  • Size

    324KB

  • Sample

    210518-ly77tkh4aj

  • MD5

    2624f1c1450fc6ce76d5df34b3f0bb00

  • SHA1

    d2fa9a1ce877ddc047a9af473594ea0c6302c380

  • SHA256

    6be34c06ba421a032634c564a1bf298406d7027adf684ec142c5039b6f46d224

  • SHA512

    32eac2ddee95d6a2f100b5018f52f8fab6dc47c9e350660f3b2c8a629c7887ea1d66532c5fba9d4564ffbd76ba293cac663092dc70bd931db5c4a539d659fa0b

Malware Config

Targets

    • Target

      6be34c06ba421a032634c564a1bf298406d7027adf684ec142c5039b6f46d224

    • Size

      324KB

    • MD5

      2624f1c1450fc6ce76d5df34b3f0bb00

    • SHA1

      d2fa9a1ce877ddc047a9af473594ea0c6302c380

    • SHA256

      6be34c06ba421a032634c564a1bf298406d7027adf684ec142c5039b6f46d224

    • SHA512

      32eac2ddee95d6a2f100b5018f52f8fab6dc47c9e350660f3b2c8a629c7887ea1d66532c5fba9d4564ffbd76ba293cac663092dc70bd931db5c4a539d659fa0b

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks