General

  • Target

    71c771edcd0bb9343f7875b5732b593bb8e00bd739f3f078c52135229cbe7042

  • Size

    229KB

  • Sample

    210518-pcnngwnqxa

  • MD5

    f9fa42df7d822d988ec0a6e585f6cec9

  • SHA1

    e7e4e1c7a2d7ed660055fcdf41599fe00f06ef64

  • SHA256

    71c771edcd0bb9343f7875b5732b593bb8e00bd739f3f078c52135229cbe7042

  • SHA512

    5d5f6fa41457e37bb86c37e4ff7ab0a428747dfbec96662352362024db6ec39dcf84af301376433658c8de2b25f9c2cab717ef96251990f9df71797fa00bbe36

Malware Config

Targets

    • Target

      71c771edcd0bb9343f7875b5732b593bb8e00bd739f3f078c52135229cbe7042

    • Size

      229KB

    • MD5

      f9fa42df7d822d988ec0a6e585f6cec9

    • SHA1

      e7e4e1c7a2d7ed660055fcdf41599fe00f06ef64

    • SHA256

      71c771edcd0bb9343f7875b5732b593bb8e00bd739f3f078c52135229cbe7042

    • SHA512

      5d5f6fa41457e37bb86c37e4ff7ab0a428747dfbec96662352362024db6ec39dcf84af301376433658c8de2b25f9c2cab717ef96251990f9df71797fa00bbe36

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks