Resubmissions

22-06-2024 18:38

240622-w938astclj 10

20-06-2024 19:06

240620-xscjpashpg 10

General

  • Target

    Yonder_Fivem.exe

  • Size

    6.3MB

  • Sample

    240620-xscjpashpg

  • MD5

    b1c825266b3ba65293047125b6187839

  • SHA1

    2717197678e400a693ca7c3a4eedf1fe7001382b

  • SHA256

    f6602a9eba868412294f032e365016623518da2a24c949e9659256c46d156bd1

  • SHA512

    24830021254f1206775201f98fb0323dec02f947374a367c8d2f0c9c328b55fe492a36b0d2217ca41f1cdeb24152290501cef7b01dfb20e717db10f92952760e

  • SSDEEP

    98304:gjWxDXRGFyZftzByQ6/Sw87AB3bq6p9OJmtgiBnuNfXWNasKo+oX2hsfBoj:gjWxFG2JByQ6/g01q6PiNiB6y97X2/j

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Extracted

Path

F:\$RECYCLE.BIN\S-1-5-21-4204450073-1267028356-951339405-1000\GMDSI-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .GMDSI The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/6b7dc5a87f217c | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- lAQAAKPu7YGdNLZB1IcUHUENwAGii3dovZmzMj5N19aLQCFsD9cU3dFfTVIkJWCkjbool5O5D4hGDQ2KKAU2p2tpjntN0S3rzgzwc5BTQGJic5gn2BEnyPLR5zGoc3iVWAxKKJeJ+fJERu006DVutleYEfI9BwnbtOPMh3y7JqgBSznVYr+jYvcxxh0KiF7kzGxCDvypZbMMckrrMf5I5rEI1920tdwgHGJLtOQp0IvS4Ppv6jCkVUD6xCq3xS5eS+YEOcZpi4K+Pt42HZrgxu60FRcBg2+FevNJaY0A7ogD2kY/T0GuOyUAZiB6GRUnBee3zEB/IEXVu03BgOLvSFQS7j0HqyNzoeGCxbnWTbPCgCkFTzuvD8sOALJNGgIfHrcSbyamefvBCY9ZUapvhQwowmHDqwF/Lf82yG1+lAp3lF3K5N/cktRlkxc0UQTEu4ST9ptXVIQbVE+Qmi7IT4oW4Tpqr+giJNINMxdBse9RC3BP+kzTnIzcPk0fbbT9QL8j/gsXlhjFmIsZsBWnnQA7wwQ7zv8Kfv1oYASQmEm8t7Lc07F9jFFDZJBrb7gLgv1YQOzj6tMDbjqSIuaZrhEwaL1ckzotcN7P0Xh6/3QYUmZqvb4CbLFZi2BtxrOjnC57hm+LQ+3NUsQgD1o4rBoWcfYtw9ZUwn3hYCikPjmMHbYK7a5nqeI5td8JIyWqEEe6M+qSQ2WcDLIqRvuqZFZ+ReAJG2vjeOjzX4dhZVkVyAr4Zc4ndlNI68VMZEJ/O21T95S1I3luJf1j2mpFM+KE9lPPROVXCKNkSazNPRHWwoZaGL7H/AIJ0g3hK8ulbYX+kZkzm5mNQO1YfYUFla+Ls+mg2GqejAa/9CkqSseE6YP/HuOPzmj1nvYPOSvgjhSKfX561hGSmgKRX+YRopo5V+gBpYK4Pc6GXP9KOiqMYIHFVNrHDkLPsNRlDGIKEsbE7c1vZanZpYNPPju4zGOgGVC3ODp5vTGbeZwppOhnAWn4K8ne0aqUyajANYE9cc8nLzgkBiZy7UoEfosu+XE2t8fdinUNxIdfyJww2I3geARM7jjoyKme08tnFr1Hyra+OCPz39/tvQgjlTi/ZuoAjiq2MXntUwII1Uw99Skt2hnBF0Umv2UGAMuCsIODvyWsKtcPxbTPWKDAVAozbvXa8Rod9zctUjuXw9fkUoiXHNZ8PEWP6rlGx8rFikxPMVVS71ddiW+mjhN46kLBUhTaDDDTtbHAH/ka2l7G8KP8Vy6gmQLm3kjYPCbJegY4vm5L5cN6nshvBxCkS/oZfI2q1CZvmhiGqISn6t+ESfuqUfksHTFQHzdHONJYP8k3KNwqUR4fjcfk6DYLaeMmhJxTSG0MATqZwpSoKh62WmEh8fMF9q3tRdGRa17U5nfpjJasg6ShQThGTGA5fSl/Ty2aN9nFe2MVsfpo8Xao5+MfC6i1GJbpat3wPbjrUSyehae3sV2EbJ36NK7s3wmbYMtW++mozYIcPzEnTLwkycWk6t6RQV2ixbLNYglKhzqqPn/LAGQlP2sVRNEnT5VmcLIDoGbfZIuJp9yPLFJENDnKLBQnqT4ZwVeIepfp1LbhSzFLngwE942y83f14ZOq/9nC+fdNhIiaI0svkqBs3r/CPbKnhCsQ9NfS4LaGkcnpAe7kb0AK98qxjPmx45RqXsHpE85AqhQbAZ1F3Yb/aDx/zRHzwUw/AnDfgANbIjPg5IE7P2BviO6U3GLlHt4oexOR6bA00L5MqYZEde84kjuJHq1nmMUYIBHBIWmMnP5p+IbX6Jz8jx5nUVhJZxvyXqyi2W281rcZIgOLdCgx9F7UgBL9lWOwv53AXo5XIEZ4L2L4CYqmzlbnG5kdZjfSGpsVmq7mhfUc1d0IGO7Q3tRy4KwbwdC+Im5Va8Qe3R5IVoJAFXTJ3Qb+mqbAIRc123SMSx0Bf9YrvxJfOaDkNRuAmRcSeUGTvC7JEMmRxGHg3PDr79ubbun3qngIZ+Pw9L00T8MQpK5FXKbMJ5f5URWZCEyQCPY2TEhGvx9MTywgcOcwwcXxJe3wqmjeGDOr8bJjYNDfPFINemzSCzeiR9eiKDTXB/AGuL+Oiw7JhK/YVs6PcijjLIN4iwTLcSC9FlsaxB010DKOsfxhhMw5741Z/pGEhw5BTLZKxf4SGuIYRJTXp2J2I2EgKN+PraFjmCRDy5uwJ8lupsFvVifNcQIXuMBGuxVEYm4d8mEDFkQrlJxoMx2SM/o= ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 7ftDEgLb/ZS0lcmZbHM61KDJ6AOtD78KkA7absMgUXYxWLsC+5+UYF9xVmD79NLJJJDLAuyVoODURWnIKnQXQzua3LPyzokSUuglaqKXwabsGM4pXku5In6gtMQMqg7sgEh1XW1iPMFgiUj/s1LdWpJHdiPjMpn7rCZNO/A31mak0K8RefoREu3BxtlAsseHWfVIIKN0U4NnA3w0Ga7XDLlF3iOIB6ImYbF6Z/7MBN2mgBr2rZ2gU1R7jNx2WKAyu4W+5zlHFnKwMISBi1CwemOo6FrxnP+Z5F9bSR7OvDBsmLj7oYD6GBgpBqj3RSAVfvfE0yZSXyCRtLeJe9BfBiNq+sZtR+W3YLHEmdOR2keCP9jy+/M2LKLjAaO2r1xWuOYPT0rJqfbML150zff7S12zgaAvoTDFrp2MPDax4ChLud7oMFoL6iSV1emrqBtvYbwArtwyqi8E1f2lWjmZ7qh4BOwkgU+wPUyub+sf0dwlLRyjx7jQwF3i9DPYKPigj42cWKb+7QkcvCqikoFdEvhEtCM4ANjhxtQXIE71RkHCybyMY50L1gk//uQFeywEnXTKCo3rMtccPEeVKMogLqob/gmOcGmVrrCCEY6sTrSMnN+abEImb4E05FHfczjSgqIbDBfFz4H7qFFwi0aAxMzGs3U= ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/6b7dc5a87f217c

Targets

    • Target

      Yonder_Fivem.exe

    • Size

      6.3MB

    • MD5

      b1c825266b3ba65293047125b6187839

    • SHA1

      2717197678e400a693ca7c3a4eedf1fe7001382b

    • SHA256

      f6602a9eba868412294f032e365016623518da2a24c949e9659256c46d156bd1

    • SHA512

      24830021254f1206775201f98fb0323dec02f947374a367c8d2f0c9c328b55fe492a36b0d2217ca41f1cdeb24152290501cef7b01dfb20e717db10f92952760e

    • SSDEEP

      98304:gjWxDXRGFyZftzByQ6/Sw87AB3bq6p9OJmtgiBnuNfXWNasKo+oX2hsfBoj:gjWxFG2JByQ6/g01q6PiNiB6y97X2/j

    • CryptoLocker

      Ransomware family with multiple variants.

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Modifies visiblity of hidden/system files in Explorer

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (541) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Contacts a large (1146) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Execution

Windows Management Instrumentation

1
T1047

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

2
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Image File Execution Options Injection

1
T1546.012

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

2
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Event Triggered Execution

2
T1546

Netsh Helper DLL

1
T1546.007

Image File Execution Options Injection

1
T1546.012

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Modify Registry

10
T1112

Impair Defenses

4
T1562

Disable or Modify Tools

2
T1562.001

Disable or Modify System Firewall

1
T1562.004

Safe Mode Boot

1
T1562.009

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Direct Volume Access

1
T1006

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Network Service Discovery

1
T1046

Query Registry

4
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

3
T1490

Defacement

1
T1491

Tasks