General

  • Target

    40014d7acbc86a699a7015c9b890ea08a564b045efc0d35ddb9132f548b9f84d

  • Size

    146KB

  • Sample

    220630-v3xlhaeafn

  • MD5

    6df4264b77cf2990590dd067e03b2f1e

  • SHA1

    1c4c7ae5dbb0ee2e764f7ea828d37eb92631cd77

  • SHA256

    40014d7acbc86a699a7015c9b890ea08a564b045efc0d35ddb9132f548b9f84d

  • SHA512

    9a551572123bf5d81161acd055d83d733dd18b5c4d3c0362edac0135080e12fd1eb51d64387f33a2e94cb6bbc6aebbd967f3df30bea81a06669cdc160aaf12fc

Malware Config

Targets

    • Target

      ok.exe

    • Size

      257KB

    • MD5

      7aa37e1425f48ca148f1a0b356162c89

    • SHA1

      e3cce5e265d5db34f4a7586476bd42064f47484e

    • SHA256

      acec132d40282e6e2af84055cd69e4e39914f516570f06dc69be30f06e3517f8

    • SHA512

      44c813eb2ee619bb62d9b32af70d36b9b546c6b2ed6d5a1ddbcc2ec32798f0319916a3dc25b213bcca9234e2b12d6f532a47ee747411a6af5747c638e6090b3b

    • GandCrab Payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)

      suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)

    • suricata: ET MALWARE Observed GandCrab Ransomware Domain (zonealarm .bit in DNS Lookup)

      suricata: ET MALWARE Observed GandCrab Ransomware Domain (zonealarm .bit in DNS Lookup)

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks