General

  • Target

    2024-10-27_10efb4d386126db3b8836c18f513e55c_gandcrab

  • Size

    73KB

  • Sample

    241027-rvse2awnfw

  • MD5

    10efb4d386126db3b8836c18f513e55c

  • SHA1

    8afb9602855d715a2c13be1b825d1cbffc099af9

  • SHA256

    cf340844d166f84183bdfd417aa9f324ec4cf961e3bde274f6ed81dc2361a006

  • SHA512

    9dd54ee76b2f3ed10c8747a841c33eaaa5b53a400463faee60f5ef5e72876d7bc663ef2f9963000cb540c765615c5077b160b5351d6d8a8db2db7a309cd48a52

  • SSDEEP

    1536:dgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:dMSjOnrmBbMqqMmr3IdE8we0Avu5r++N

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-10-27_10efb4d386126db3b8836c18f513e55c_gandcrab

    • Size

      73KB

    • MD5

      10efb4d386126db3b8836c18f513e55c

    • SHA1

      8afb9602855d715a2c13be1b825d1cbffc099af9

    • SHA256

      cf340844d166f84183bdfd417aa9f324ec4cf961e3bde274f6ed81dc2361a006

    • SHA512

      9dd54ee76b2f3ed10c8747a841c33eaaa5b53a400463faee60f5ef5e72876d7bc663ef2f9963000cb540c765615c5077b160b5351d6d8a8db2db7a309cd48a52

    • SSDEEP

      1536:dgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:dMSjOnrmBbMqqMmr3IdE8we0Avu5r++N

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks