new.exe

General
Target

new.exe

Size

1MB

Sample

220521-xyyzwagaar

Score
10 /10
MD5

567bc0f1abc4493a0302f73f76d99fda

SHA1

287799cbe83a6ee7f811da3017081b589ff1d0ad

SHA256

d11d4506f4edca9f202a237d35f484ee02aa0579d886696385d16769c8eb21d0

SHA512

c45271cb1d9dff01267da34f625891172c50d8ae870bff7a7dbab1e509c12a43c89f7afbeb5b49009372ffadac6e0184a3f98ff08c6edaedb5a093bcc9af5294

Malware Config

Extracted

Path C:\MBCCKHP-DECRYPT.txt
Ransom Note
---= GANDCRAB V5.0.3 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE WILL BE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .MBCCKHP The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/1020258edde7f61a | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/1020258edde7f61a

Targets
Target

new.exe

MD5

567bc0f1abc4493a0302f73f76d99fda

Filesize

1MB

Score
10/10
SHA1

287799cbe83a6ee7f811da3017081b589ff1d0ad

SHA256

d11d4506f4edca9f202a237d35f484ee02aa0579d886696385d16769c8eb21d0

SHA512

c45271cb1d9dff01267da34f625891172c50d8ae870bff7a7dbab1e509c12a43c89f7afbeb5b49009372ffadac6e0184a3f98ff08c6edaedb5a093bcc9af5294

Tags

Signatures

  • Gandcrab

    Description

    Gandcrab is a Trojan horse that encrypts files on a computer.

    Tags

  • suricata: ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity

    Description

    suricata: ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity

    Tags

  • Deletes shadow copies

    Description

    Ransomware often targets backup files to inhibit system recovery.

    Tags

    TTPs

    File DeletionInhibit System Recovery
  • Modifies extensions of user files

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

  • Drops startup file

  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery
  • Sets desktop wallpaper using registry

    Tags

    TTPs

    DefacementModify Registry

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Execution
          Exfiltration
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1