General

  • Target

    41943e66355d19b291f5ea87a2284cab0a7f32cc05f42efb936216859e52756f

  • Size

    321KB

  • Sample

    220708-fzf21sbaap

  • MD5

    81219362437edad064425e27bf2a1305

  • SHA1

    116ae773fbdf2b4abebecd8331b790c9b17860fe

  • SHA256

    41943e66355d19b291f5ea87a2284cab0a7f32cc05f42efb936216859e52756f

  • SHA512

    90105e1d6f49e9ff20c2b6fdb185a17d18c018c96d260d81eaff6db6e5e3d19af55e34408fa088a8c5dced9c6b8abd9517292fe49583d065017b78b55ba63494

Malware Config

Targets

    • Target

      41943e66355d19b291f5ea87a2284cab0a7f32cc05f42efb936216859e52756f

    • Size

      321KB

    • MD5

      81219362437edad064425e27bf2a1305

    • SHA1

      116ae773fbdf2b4abebecd8331b790c9b17860fe

    • SHA256

      41943e66355d19b291f5ea87a2284cab0a7f32cc05f42efb936216859e52756f

    • SHA512

      90105e1d6f49e9ff20c2b6fdb185a17d18c018c96d260d81eaff6db6e5e3d19af55e34408fa088a8c5dced9c6b8abd9517292fe49583d065017b78b55ba63494

    • GandCrab payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)

      suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)

    • suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)

      suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks