General

  • Target

    3672b1bbd1f3d380972c54324eb814cd582894cc6b22743955e70e741b5085e1

  • Size

    283KB

  • Sample

    220626-czqpnsdffl

  • MD5

    1ecde1b4671e02670b350ba0d32f5968

  • SHA1

    284a5ee7a53ea9f859b5b78b9b831e65f452a956

  • SHA256

    3672b1bbd1f3d380972c54324eb814cd582894cc6b22743955e70e741b5085e1

  • SHA512

    955439223608799b6e6266ed698c717eb28c445697551165578b9103335295a040154c0df5fe43142ebba792ef479db6d691f4db2d22fa0e4b1a79c57e296eed

Malware Config

Targets

    • Target

      3672b1bbd1f3d380972c54324eb814cd582894cc6b22743955e70e741b5085e1

    • Size

      283KB

    • MD5

      1ecde1b4671e02670b350ba0d32f5968

    • SHA1

      284a5ee7a53ea9f859b5b78b9b831e65f452a956

    • SHA256

      3672b1bbd1f3d380972c54324eb814cd582894cc6b22743955e70e741b5085e1

    • SHA512

      955439223608799b6e6266ed698c717eb28c445697551165578b9103335295a040154c0df5fe43142ebba792ef479db6d691f4db2d22fa0e4b1a79c57e296eed

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)

      suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)

    • suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)

      suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks