General

  • Target

    2024-10-20_d9b174222a3418b15eac14622a5617c7_gandcrab

  • Size

    73KB

  • Sample

    241020-fm9hsszgrh

  • MD5

    d9b174222a3418b15eac14622a5617c7

  • SHA1

    3027c603ba2635ca4885c3b0cbf06a05b1b00d49

  • SHA256

    29042a328c1d5ddf1f2fb4da9ad3b451a22346ec2b5fdde2519bebdda4657c1e

  • SHA512

    3db3fbf575aafea792e289567fd29137e4811b3502df3c04d9bd743808077373b79e40fe1aa7fbdc1cc4bf92cb34dcfa9ca033d38b2743e565df1db2d99bf618

  • SSDEEP

    1536:y55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:IMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-10-20_d9b174222a3418b15eac14622a5617c7_gandcrab

    • Size

      73KB

    • MD5

      d9b174222a3418b15eac14622a5617c7

    • SHA1

      3027c603ba2635ca4885c3b0cbf06a05b1b00d49

    • SHA256

      29042a328c1d5ddf1f2fb4da9ad3b451a22346ec2b5fdde2519bebdda4657c1e

    • SHA512

      3db3fbf575aafea792e289567fd29137e4811b3502df3c04d9bd743808077373b79e40fe1aa7fbdc1cc4bf92cb34dcfa9ca033d38b2743e565df1db2d99bf618

    • SSDEEP

      1536:y55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:IMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks