General

  • Target

    32edfec8a4c16ad2f6764fab5fcb1464_JC.exe

  • Size

    73KB

  • Sample

    230917-lnyetabf44

  • MD5

    32edfec8a4c16ad2f6764fab5fcb1464

  • SHA1

    902a7d18f900f2b4b20cb2b59c909e5acff71711

  • SHA256

    ffe34a4c680b95eb9d72b60c5f432d93d7aea3652457be17c16a85b083cd023b

  • SHA512

    30fce5b7de89dadf27b3616e48bf279fa89c02d9bd17cd22880cbc4f8c33ec4e3b6110fea6075f9cff99de3da94c84d149e6c445995a98bf7fa9d331d1d586b4

  • SSDEEP

    1536:ZgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:ZMSjOnrmBbMqqMmr3IdE8we0Avu5r++N

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      32edfec8a4c16ad2f6764fab5fcb1464_JC.exe

    • Size

      73KB

    • MD5

      32edfec8a4c16ad2f6764fab5fcb1464

    • SHA1

      902a7d18f900f2b4b20cb2b59c909e5acff71711

    • SHA256

      ffe34a4c680b95eb9d72b60c5f432d93d7aea3652457be17c16a85b083cd023b

    • SHA512

      30fce5b7de89dadf27b3616e48bf279fa89c02d9bd17cd22880cbc4f8c33ec4e3b6110fea6075f9cff99de3da94c84d149e6c445995a98bf7fa9d331d1d586b4

    • SSDEEP

      1536:ZgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:ZMSjOnrmBbMqqMmr3IdE8we0Avu5r++N

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks