General

  • Target

    2024-09-27_3a5628a310c90dd19e534c951433b890_gandcrab

  • Size

    73KB

  • Sample

    240927-d3el9ataql

  • MD5

    3a5628a310c90dd19e534c951433b890

  • SHA1

    de1b70bc21f4f3b12f01daeea1f7d2c5f65853ab

  • SHA256

    39abd46eee1a0f8b10cfc926110f7b09ff2c864aecb3d0962515d249aed1cdd1

  • SHA512

    63ae295d3f379c1e67b0d544f2b78fc5a75a51c024ef831b27059c0d0fa1f0cb4d3debfe178a74d86e39924a2e6d46fb3dad56c0f178c95e7f780dbede0c3628

  • SSDEEP

    1536:T555555555555pmgSeGDjtQhnwmmB0y1MqqU+2bbbAV2/S2mr3IdE8mne0Avu5rH:UMSjOnrmB9MqqDL2/mr3IdE8we0Avu5h

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-09-27_3a5628a310c90dd19e534c951433b890_gandcrab

    • Size

      73KB

    • MD5

      3a5628a310c90dd19e534c951433b890

    • SHA1

      de1b70bc21f4f3b12f01daeea1f7d2c5f65853ab

    • SHA256

      39abd46eee1a0f8b10cfc926110f7b09ff2c864aecb3d0962515d249aed1cdd1

    • SHA512

      63ae295d3f379c1e67b0d544f2b78fc5a75a51c024ef831b27059c0d0fa1f0cb4d3debfe178a74d86e39924a2e6d46fb3dad56c0f178c95e7f780dbede0c3628

    • SSDEEP

      1536:T555555555555pmgSeGDjtQhnwmmB0y1MqqU+2bbbAV2/S2mr3IdE8mne0Avu5rH:UMSjOnrmB9MqqDL2/mr3IdE8we0Avu5h

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks