General

  • Target

    2024-10-20_f18066ca056c81a5d51c7c57194bb831_gandcrab

  • Size

    73KB

  • Sample

    241020-jrl5vayhjq

  • MD5

    f18066ca056c81a5d51c7c57194bb831

  • SHA1

    09125d2c6eab0f4733dd6efbf971d8cc3e1b9d28

  • SHA256

    010f5bd03a17f17a4f92fb47ec204895278cd360ed0d85dbc7063c7dbf4a86fc

  • SHA512

    438d6215b5592ffa5ae84c10882383a4334eb0469baa66c91fbb6bc92312aad78f20d76720d0bbb2a6f63a49c576f5a0f83befb513bbc9923cc20bd794d008cd

  • SSDEEP

    1536:v555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:wMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-10-20_f18066ca056c81a5d51c7c57194bb831_gandcrab

    • Size

      73KB

    • MD5

      f18066ca056c81a5d51c7c57194bb831

    • SHA1

      09125d2c6eab0f4733dd6efbf971d8cc3e1b9d28

    • SHA256

      010f5bd03a17f17a4f92fb47ec204895278cd360ed0d85dbc7063c7dbf4a86fc

    • SHA512

      438d6215b5592ffa5ae84c10882383a4334eb0469baa66c91fbb6bc92312aad78f20d76720d0bbb2a6f63a49c576f5a0f83befb513bbc9923cc20bd794d008cd

    • SSDEEP

      1536:v555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:wMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks