General

  • Target

    3a228523d92073aa3d7e1b69ec36cdca0e616af890f7520b6a5118940a409803

  • Size

    69KB

  • Sample

    220625-hey37shgar

  • MD5

    d905afdb5f563e54524dcd4c3dc21e37

  • SHA1

    54dd9c09891a01b7973690ce74b355772c365b2f

  • SHA256

    3a228523d92073aa3d7e1b69ec36cdca0e616af890f7520b6a5118940a409803

  • SHA512

    a54cef7db5e92b7eb07502dda773b11e6046ca19a13ca94c079c16b698ffe0c37977433cda5084ffdfd63f902e051de61bf8f59abfae2711396e50e9348e1497

Malware Config

Targets

    • Target

      3a228523d92073aa3d7e1b69ec36cdca0e616af890f7520b6a5118940a409803

    • Size

      69KB

    • MD5

      d905afdb5f563e54524dcd4c3dc21e37

    • SHA1

      54dd9c09891a01b7973690ce74b355772c365b2f

    • SHA256

      3a228523d92073aa3d7e1b69ec36cdca0e616af890f7520b6a5118940a409803

    • SHA512

      a54cef7db5e92b7eb07502dda773b11e6046ca19a13ca94c079c16b698ffe0c37977433cda5084ffdfd63f902e051de61bf8f59abfae2711396e50e9348e1497

    Score
    10/10
    • suricata: ET MALWARE Observed GandCrab Domain (gandcrab .bit)

      suricata: ET MALWARE Observed GandCrab Domain (gandcrab .bit)

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks