General

  • Target

    2f3e8fe67910b5f323ec1918d40dacf66b162bf8efab54299da2838d749090c2

  • Size

    209KB

  • Sample

    210518-tk3msqm81a

  • MD5

    1e400a64ef55096faa54531cbb0e65c0

  • SHA1

    74f4d01681d7b3cb2f4ff2e9a53921488e2a5fe6

  • SHA256

    2f3e8fe67910b5f323ec1918d40dacf66b162bf8efab54299da2838d749090c2

  • SHA512

    fb5157fab4893e64f15985f0a731c366b3b3612ed78674fd12a9c47887cd87cbc7e9f307c36241a3387f560eee12af2520e6262d5f07632d9cf9e301276f12a5

Malware Config

Targets

    • Target

      2f3e8fe67910b5f323ec1918d40dacf66b162bf8efab54299da2838d749090c2

    • Size

      209KB

    • MD5

      1e400a64ef55096faa54531cbb0e65c0

    • SHA1

      74f4d01681d7b3cb2f4ff2e9a53921488e2a5fe6

    • SHA256

      2f3e8fe67910b5f323ec1918d40dacf66b162bf8efab54299da2838d749090c2

    • SHA512

      fb5157fab4893e64f15985f0a731c366b3b3612ed78674fd12a9c47887cd87cbc7e9f307c36241a3387f560eee12af2520e6262d5f07632d9cf9e301276f12a5

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks