General

  • Target

    de2fb10156d4852276992216e053a0c57fccf1e79051010ebf8299a4e9e253fb

  • Size

    79KB

  • Sample

    220703-v3xw9sacgk

  • MD5

    fc43d639ba6ccea886c31aeb8fcac9a0

  • SHA1

    f4b8f4baa67561fe82541c0f0ea46937bed40e4a

  • SHA256

    de2fb10156d4852276992216e053a0c57fccf1e79051010ebf8299a4e9e253fb

  • SHA512

    8d56948802c97e6b1aa261a67aa9d822a89d899733de647427983e501a739de1cb27c7773968e23d840cd59a7fff5e539452167a3ad94cbed074a0be25457eaf

Malware Config

Targets

    • Target

      sample

    • Size

      183KB

    • MD5

      07fadb006486953439ce0092651fd7a6

    • SHA1

      e42431d37561cc695de03b85e8e99c9e31321742

    • SHA256

      d77378dcc42b912e514d3bd4466cdda050dda9b57799a6c97f70e8489dd8c8d0

    • SHA512

      5b09a07371bb5350b22c78aa3e7e673ba61ce72a964e072749a4633e2c15f416c05953cc6e6f6c586df010aa7f2c9c0ab87a014e4f732e5fdb2d58778a1fb437

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • suricata: ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity

      suricata: ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

1
T1107

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

1
T1490

Defacement

1
T1491

Tasks