General

  • Target

    2024-02-17_ff90123bf3b0f4e73e292eabf9a5cd4b_gandcrab

  • Size

    73KB

  • Sample

    240217-2492jscb54

  • MD5

    ff90123bf3b0f4e73e292eabf9a5cd4b

  • SHA1

    53915a1a4c7830cf4e5f8a394d24dba0be70b67e

  • SHA256

    cf86ee99f4160de4b49f032909d8f71f13cfafb734af22d30770b504d728e9a7

  • SHA512

    3d2b8dde1cd89431b555494063adcddfe7bef423cd317e916bf78a6e814e021414e8f70d494171a4a806511d92876b3cf1aa902e7a170902a16a7a9f71ee8c24

  • SSDEEP

    1536:B555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:uMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-02-17_ff90123bf3b0f4e73e292eabf9a5cd4b_gandcrab

    • Size

      73KB

    • MD5

      ff90123bf3b0f4e73e292eabf9a5cd4b

    • SHA1

      53915a1a4c7830cf4e5f8a394d24dba0be70b67e

    • SHA256

      cf86ee99f4160de4b49f032909d8f71f13cfafb734af22d30770b504d728e9a7

    • SHA512

      3d2b8dde1cd89431b555494063adcddfe7bef423cd317e916bf78a6e814e021414e8f70d494171a4a806511d92876b3cf1aa902e7a170902a16a7a9f71ee8c24

    • SSDEEP

      1536:B555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:uMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks