General

  • Target

    RNSM00365.7z

  • Size

    21.2MB

  • Sample

    241107-tyx6sswbkn

  • MD5

    3dcf38d6eb0239f2371910420c478d24

  • SHA1

    db2fd304e4110b274df019eafdddb734a21c8a6e

  • SHA256

    9d5387010b7383c83509798c3acc2228192602c93b54ab3b2a8bfb630a1347a8

  • SHA512

    be720f8e324083417bc19814d529792bff223ed45e6ad9f6cc86df8a796cf9016183704c0155de955d9300c1cbec43f9aea2d826115e39d31bfd2ba874ae39fb

  • SSDEEP

    393216:VKc/3fupUewDJCuZkv1vTFMI8+UkcHhuDIfaPv+vVMMyPqBoeu5/dwNX1/:V3H0U7kv1v2I8+WhuDIyXQVMJHGNF/

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\JKTHZ-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .JKTHZ The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/82ee6a948478294f | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 7ftDEgLb/ZS0lcmZbHM61KDJ6AOtD78KkA7absMgUXYxWLsC+5+UYF9xVmDt9MzJOJDfAuaVr+DXRWPIKnQXQzua3LPyzokSUuglaqKXwabsGM4pXku5In6gtMQMqg7sgEh1XW1iPMFgiUj/s1LdWpJHdiPjMpn7rCZNO/A31mak0K8RefoREu3BxtlAsseHWfVIIKN0U4NnA3w0Ga7XDLlF3iOIB6ImYbF6Z/7MBN2mgBr2rZ2gU1R7jNx2WKAyu4W+5zlHFnKwMISBi1CwemOo6FrxnP+Z5F9bSR7OvDBsmLj7oYD6GBgpBqj3RSAVfvfE0yZSXyCRtLeJddAPBnFq+8Y4R7G3OLHImdyRiEeHP9Hy/vNsLLDjD6P0r1BW4eYoT03JrPa/L0B0wffnS0ez96BFoTHFq52HPDCx6yhEudvoPVoM6iaVy+mvqAdvYbwBrtkyoy8D1fKlXDmU7qh4Bew/gT+wK0yub5gfz9wpLQCj3bimwDPi8jPeKPiggI2bWKz+7QkWvC2ihYFfEuZEsiM8ANzhwdQRIEf1UkGTyf6MN51c1gY/+uQae28EznTbCqfrOdcnPBOVfcolLq8b8gmbcCmV7bCGEZisVbSQnNiaPkJ9b5I041HXc2vSx6IODB3F1IH8qANwhkbcxMPGvnUSm+rK ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/82ee6a948478294f

Targets

    • Target

      RNSM00365.7z

    • Size

      21.2MB

    • MD5

      3dcf38d6eb0239f2371910420c478d24

    • SHA1

      db2fd304e4110b274df019eafdddb734a21c8a6e

    • SHA256

      9d5387010b7383c83509798c3acc2228192602c93b54ab3b2a8bfb630a1347a8

    • SHA512

      be720f8e324083417bc19814d529792bff223ed45e6ad9f6cc86df8a796cf9016183704c0155de955d9300c1cbec43f9aea2d826115e39d31bfd2ba874ae39fb

    • SSDEEP

      393216:VKc/3fupUewDJCuZkv1vTFMI8+UkcHhuDIfaPv+vVMMyPqBoeu5/dwNX1/:V3H0U7kv1v2I8+WhuDIyXQVMJHGNF/

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Troldesh family

    • Troldesh, Shade, Encoder.858

      Troldesh is a ransomware spread by malspam.

    • UAC bypass

    • Windows security bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (214) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks