General

  • Target

    2024-04-20_2cc7d449c6bf120630f82194f07df9c4_gandcrab

  • Size

    88KB

  • Sample

    240420-2bfl8sca8y

  • MD5

    2cc7d449c6bf120630f82194f07df9c4

  • SHA1

    985c7a252eb0c5cb745d683a700cd485f438bc67

  • SHA256

    42ad0001600cc976ce8861b9187d6af8d3c1d4cc4b83f1735a7b057377628e6f

  • SHA512

    fd9be9f3dda97241f4bf095807f0130cdac3b5e35886687bb56b659958e61f08d1b29334f937e8eec513eae9cfd161fe9c913bda1cb1d3f930b40e6bb60fd6d9

  • SSDEEP

    1536:DrsWDX9pwpQUMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:DjDX9pwzMqqDL2/mr3IdE8we0Avu5r+g

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-04-20_2cc7d449c6bf120630f82194f07df9c4_gandcrab

    • Size

      88KB

    • MD5

      2cc7d449c6bf120630f82194f07df9c4

    • SHA1

      985c7a252eb0c5cb745d683a700cd485f438bc67

    • SHA256

      42ad0001600cc976ce8861b9187d6af8d3c1d4cc4b83f1735a7b057377628e6f

    • SHA512

      fd9be9f3dda97241f4bf095807f0130cdac3b5e35886687bb56b659958e61f08d1b29334f937e8eec513eae9cfd161fe9c913bda1cb1d3f930b40e6bb60fd6d9

    • SSDEEP

      1536:DrsWDX9pwpQUMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:DjDX9pwzMqqDL2/mr3IdE8we0Avu5r+g

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks