General

  • Target

    no_malwareneedscoffee.bin

  • Size

    188KB

  • Sample

    230919-r344sshf8t

  • MD5

    d37a089009e52bac991d1b891d68f6ab

  • SHA1

    408fa69747e38fe5f6829313dcaaec502b90676f

  • SHA256

    eb9207371e53414cfcb2094a2e34bd68be1a9eedbe49c4ded82b2adb8fa1d23d

  • SHA512

    749e9fc47424f04bf2d842e6847dea64efa768582bc1ed8b97aa65406dc6df6ca793a47567f8d936af81123c51c029dd1820b84a7e5a97754f53214bb46cdbbe

  • SSDEEP

    3072:pAGw4Ykx7OqPqCliu6OTILQD4f5jCgrQp0MQs40:pAR4r7txdIU060MR4

Malware Config

Extracted

Path

F:\MXCDV-DECRYPT.txt

Ransom Note
---= GANDCRAB V5.0 =--- Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .MXCDV The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/eabd24dbe9bd954f | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/eabd24dbe9bd954f

Targets

    • Target

      no_malwareneedscoffee.bin

    • Size

      188KB

    • MD5

      d37a089009e52bac991d1b891d68f6ab

    • SHA1

      408fa69747e38fe5f6829313dcaaec502b90676f

    • SHA256

      eb9207371e53414cfcb2094a2e34bd68be1a9eedbe49c4ded82b2adb8fa1d23d

    • SHA512

      749e9fc47424f04bf2d842e6847dea64efa768582bc1ed8b97aa65406dc6df6ca793a47567f8d936af81123c51c029dd1820b84a7e5a97754f53214bb46cdbbe

    • SSDEEP

      3072:pAGw4Ykx7OqPqCliu6OTILQD4f5jCgrQp0MQs40:pAR4r7txdIU060MR4

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Renames multiple (142) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks