Resubmissions

14-08-2024 15:44

240814-s6jgyazgqb 10

14-08-2024 15:10

240814-sj92datfkm 10

General

  • Target

    idapro.exe

  • Size

    327KB

  • Sample

    240814-sj92datfkm

  • MD5

    0ed74836af595a75d959e703e98f3735

  • SHA1

    f48fe1347528b1bcc210a90c60e93300ddfb1c31

  • SHA256

    3b14f10b8cd5c55d405785829bf2e8e4917fe1ac432ec0a376b2b4621314686c

  • SHA512

    dd5bb6e6c2674b8b2de6b22c0f7cc051303592d0fd50e14c8452988646760c907c9650e5b7ab594027e01faa9216f2b865b5ab015f34d92e62d51373f8152fbe

  • SSDEEP

    6144:UsLqdufVUNDa+anxutqrmxBpwrWlTKh4Qffn2n:PFUNDa+axuS+waZ84

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Extracted

Path

C:\Users\JPZBXNNZ-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .JPZBXNNZ The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/79ad147692edc1de | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/79ad147692edc1de

Targets

    • Target

      idapro.exe

    • Size

      327KB

    • MD5

      0ed74836af595a75d959e703e98f3735

    • SHA1

      f48fe1347528b1bcc210a90c60e93300ddfb1c31

    • SHA256

      3b14f10b8cd5c55d405785829bf2e8e4917fe1ac432ec0a376b2b4621314686c

    • SHA512

      dd5bb6e6c2674b8b2de6b22c0f7cc051303592d0fd50e14c8452988646760c907c9650e5b7ab594027e01faa9216f2b865b5ab015f34d92e62d51373f8152fbe

    • SSDEEP

      6144:UsLqdufVUNDa+anxutqrmxBpwrWlTKh4Qffn2n:PFUNDa+axuS+waZ84

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Modifies visiblity of hidden/system files in Explorer

    • Renames multiple (524) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks