General

  • Target

    8fce37a89ef735e054ba58fc616d496b472c0e772d17fa707e5d3da8cd1c893a

  • Size

    244KB

  • Sample

    210518-mmvtgesjcn

  • MD5

    06ed9e95bb40e6d8ab505d49442db30d

  • SHA1

    284428fde1a49be531626cbae45992ce5f6bde89

  • SHA256

    8fce37a89ef735e054ba58fc616d496b472c0e772d17fa707e5d3da8cd1c893a

  • SHA512

    087441dc7c84206614cc16e762db6b976956f707ed596a43fd36ee1cf3e5c46953502ee8f4c43e4ef0e5de61829e06eda1fbdddfceee153a72f5eb5bfe000c06

Malware Config

Targets

    • Target

      8fce37a89ef735e054ba58fc616d496b472c0e772d17fa707e5d3da8cd1c893a

    • Size

      244KB

    • MD5

      06ed9e95bb40e6d8ab505d49442db30d

    • SHA1

      284428fde1a49be531626cbae45992ce5f6bde89

    • SHA256

      8fce37a89ef735e054ba58fc616d496b472c0e772d17fa707e5d3da8cd1c893a

    • SHA512

      087441dc7c84206614cc16e762db6b976956f707ed596a43fd36ee1cf3e5c46953502ee8f4c43e4ef0e5de61829e06eda1fbdddfceee153a72f5eb5bfe000c06

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks