General

  • Target

    2024-05-24_d168d6234f65a16419abc8cdc95003e0_gandcrab

  • Size

    73KB

  • Sample

    240524-1mfwpscd69

  • MD5

    d168d6234f65a16419abc8cdc95003e0

  • SHA1

    e722a03cbc18d028961073d063e2fc8837ecca03

  • SHA256

    5eef9e099b73002f4d1ca18ea25a5d4d77b593f71ef13dd42a6e2a8b59801c65

  • SHA512

    3b92b3d0cea3a46ba3a89cc65ad39a1c780189da70b617db33e7772435d8634f44ab2caeca6fa286b34d78fddedd5281c5db1b0abdaba4c5cec516cd003aae78

  • SSDEEP

    1536:K555555555555pmgSeGDjtQhnwmmB0ypXdMqqU+2bbbAV2/S2mr3IdE8mne0AvuR:7MSjOnrmBBtMqqDL2/mr3IdE8we0Avuj

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-05-24_d168d6234f65a16419abc8cdc95003e0_gandcrab

    • Size

      73KB

    • MD5

      d168d6234f65a16419abc8cdc95003e0

    • SHA1

      e722a03cbc18d028961073d063e2fc8837ecca03

    • SHA256

      5eef9e099b73002f4d1ca18ea25a5d4d77b593f71ef13dd42a6e2a8b59801c65

    • SHA512

      3b92b3d0cea3a46ba3a89cc65ad39a1c780189da70b617db33e7772435d8634f44ab2caeca6fa286b34d78fddedd5281c5db1b0abdaba4c5cec516cd003aae78

    • SSDEEP

      1536:K555555555555pmgSeGDjtQhnwmmB0ypXdMqqU+2bbbAV2/S2mr3IdE8mne0AvuR:7MSjOnrmBBtMqqDL2/mr3IdE8we0Avuj

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks