General

  • Target

    2024-03-24_36bfc17b96a158044b301e84b737b36c_gandcrab

  • Size

    73KB

  • Sample

    240324-f9te4acg4v

  • MD5

    36bfc17b96a158044b301e84b737b36c

  • SHA1

    558cea8fa169c8bb7652165a54f71e4593d027b6

  • SHA256

    40b7cf1c0b98837857da8241900aceecad59f17b6d1cb0109fec795d86ebea98

  • SHA512

    6ce51db1bee6382f86b2b5201afbba75ca89297ae0dc263d8e6ff8cdd5ea4145e15aba132c0f0bab7a0f09b828e5dd5b975f78e9bf4ca5fb06bdf076b83818a8

  • SSDEEP

    1536:7555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:cMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-03-24_36bfc17b96a158044b301e84b737b36c_gandcrab

    • Size

      73KB

    • MD5

      36bfc17b96a158044b301e84b737b36c

    • SHA1

      558cea8fa169c8bb7652165a54f71e4593d027b6

    • SHA256

      40b7cf1c0b98837857da8241900aceecad59f17b6d1cb0109fec795d86ebea98

    • SHA512

      6ce51db1bee6382f86b2b5201afbba75ca89297ae0dc263d8e6ff8cdd5ea4145e15aba132c0f0bab7a0f09b828e5dd5b975f78e9bf4ca5fb06bdf076b83818a8

    • SSDEEP

      1536:7555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:cMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks