General

  • Target

    5e296ad95844f259faed968ac78ed066254a9d3b6e511a6cee61278cacfbf12a

  • Size

    235KB

  • Sample

    220731-z21c8agfa2

  • MD5

    b01def8d40508f47389660370fb764f5

  • SHA1

    985351e28ae47d6f9023f69603cdd6cfb56a6d57

  • SHA256

    5e296ad95844f259faed968ac78ed066254a9d3b6e511a6cee61278cacfbf12a

  • SHA512

    836829b73ea5e4f255bfafc4fd3817df83d642690625c909c7d2d525b68be19c8f878c8befa972120395f2fdc2450238a28dfbc37dd442e7d21c5d667047bc58

Malware Config

Targets

    • Target

      5e296ad95844f259faed968ac78ed066254a9d3b6e511a6cee61278cacfbf12a

    • Size

      235KB

    • MD5

      b01def8d40508f47389660370fb764f5

    • SHA1

      985351e28ae47d6f9023f69603cdd6cfb56a6d57

    • SHA256

      5e296ad95844f259faed968ac78ed066254a9d3b6e511a6cee61278cacfbf12a

    • SHA512

      836829b73ea5e4f255bfafc4fd3817df83d642690625c909c7d2d525b68be19c8f878c8befa972120395f2fdc2450238a28dfbc37dd442e7d21c5d667047bc58

    • GandCrab payload

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks