General

  • Target

    2024-10-20_d635cf7e4ff8cf39c00507c1ade4f460_gandcrab

  • Size

    73KB

  • Sample

    241020-lx71lssbke

  • MD5

    d635cf7e4ff8cf39c00507c1ade4f460

  • SHA1

    8419f546a53959044a6c5f946377ae2d9421a363

  • SHA256

    cf64404a126ef36181cdf855d1cd8c4d267200f68cb22713d28b704c43bce271

  • SHA512

    392c41476f8e9c346d9f0681fb832e403258f7bf7c31ee1c270ff94a85cb161d6fb8db79d647e9aaabc718433e0f6446ec12a9c130867df45873ed74d6411bd7

  • SSDEEP

    1536:U555555555555pmgSeGDjtQhnwmmB0ypXdMqqU+2bbbAV2/S2mr3IdE8mne0Avue:RMSjOnrmBBtMqqDL2/mr3IdE8we0Avuj

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-10-20_d635cf7e4ff8cf39c00507c1ade4f460_gandcrab

    • Size

      73KB

    • MD5

      d635cf7e4ff8cf39c00507c1ade4f460

    • SHA1

      8419f546a53959044a6c5f946377ae2d9421a363

    • SHA256

      cf64404a126ef36181cdf855d1cd8c4d267200f68cb22713d28b704c43bce271

    • SHA512

      392c41476f8e9c346d9f0681fb832e403258f7bf7c31ee1c270ff94a85cb161d6fb8db79d647e9aaabc718433e0f6446ec12a9c130867df45873ed74d6411bd7

    • SSDEEP

      1536:U555555555555pmgSeGDjtQhnwmmB0ypXdMqqU+2bbbAV2/S2mr3IdE8mne0Avue:RMSjOnrmBBtMqqDL2/mr3IdE8we0Avuj

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks