General

  • Target

    7ed2b53fa30bb059a94143cf7890016d_JaffaCakes118

  • Size

    73KB

  • Sample

    240528-3tmzpsae93

  • MD5

    7ed2b53fa30bb059a94143cf7890016d

  • SHA1

    162e3d887ac643ae4faed73247569967b2d88e41

  • SHA256

    81ed26ef7fe7552dd8bc6848db6aa960b6da242e85419c169353194778dd5aa4

  • SHA512

    e1dc85a6e33362762a2159c9c127f46e78c5e2ee902dde83efda99bfcc67aebc870bcb4789205685c827404456e6a79c38efd5ae6b286f0d9ae9fccc7be66cbb

  • SSDEEP

    1536:c55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:eMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      7ed2b53fa30bb059a94143cf7890016d_JaffaCakes118

    • Size

      73KB

    • MD5

      7ed2b53fa30bb059a94143cf7890016d

    • SHA1

      162e3d887ac643ae4faed73247569967b2d88e41

    • SHA256

      81ed26ef7fe7552dd8bc6848db6aa960b6da242e85419c169353194778dd5aa4

    • SHA512

      e1dc85a6e33362762a2159c9c127f46e78c5e2ee902dde83efda99bfcc67aebc870bcb4789205685c827404456e6a79c38efd5ae6b286f0d9ae9fccc7be66cbb

    • SSDEEP

      1536:c55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:eMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h

    Score
    6/10
    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks