General

  • Target

    42fc8b9725da96451ff3a91ea471173d88ce40be7ab96ec143484ca7290d786f

  • Size

    73KB

  • Sample

    220708-aqrt9sccb6

  • MD5

    f012a16bfd04c3dc5e5dd19973f7b6ab

  • SHA1

    809606233068b39f7ce1e7ae3f9c4fa0b1dc6d2e

  • SHA256

    42fc8b9725da96451ff3a91ea471173d88ce40be7ab96ec143484ca7290d786f

  • SHA512

    b46f260f11e359c5470978712ffa42f610f351a932f781d7a9d89879a7b9a53ad22be4e9896b6857f5381cd156e89fe9ae260aa1eba9363806ccff31ec03711e

Malware Config

Targets

    • Target

      42fc8b9725da96451ff3a91ea471173d88ce40be7ab96ec143484ca7290d786f

    • Size

      73KB

    • MD5

      f012a16bfd04c3dc5e5dd19973f7b6ab

    • SHA1

      809606233068b39f7ce1e7ae3f9c4fa0b1dc6d2e

    • SHA256

      42fc8b9725da96451ff3a91ea471173d88ce40be7ab96ec143484ca7290d786f

    • SHA512

      b46f260f11e359c5470978712ffa42f610f351a932f781d7a9d89879a7b9a53ad22be4e9896b6857f5381cd156e89fe9ae260aa1eba9363806ccff31ec03711e

    Score
    10/10
    • suricata: ET MALWARE Observed GandCrab Domain (gandcrab .bit)

      suricata: ET MALWARE Observed GandCrab Domain (gandcrab .bit)

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks