General

  • Target

    64f2ee0b2093d25b12c79939c9604cb542d1692bf4c01086aa13ac1462dd23a1

  • Size

    281KB

  • Sample

    210518-zey2qj7lss

  • MD5

    76f1e47311761307e5805d272e3ab022

  • SHA1

    19cf00f4e203c2acd2fba4ec306dd372be222a0d

  • SHA256

    64f2ee0b2093d25b12c79939c9604cb542d1692bf4c01086aa13ac1462dd23a1

  • SHA512

    98b382e8196e2009fae647c32cb61eac7214ba0e65d019f7c97583695aef9cd2ad4660508760a4c69d2024e528f836a628d0580468930c5e22a1978a8b63d43a

Malware Config

Targets

    • Target

      64f2ee0b2093d25b12c79939c9604cb542d1692bf4c01086aa13ac1462dd23a1

    • Size

      281KB

    • MD5

      76f1e47311761307e5805d272e3ab022

    • SHA1

      19cf00f4e203c2acd2fba4ec306dd372be222a0d

    • SHA256

      64f2ee0b2093d25b12c79939c9604cb542d1692bf4c01086aa13ac1462dd23a1

    • SHA512

      98b382e8196e2009fae647c32cb61eac7214ba0e65d019f7c97583695aef9cd2ad4660508760a4c69d2024e528f836a628d0580468930c5e22a1978a8b63d43a

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks