General

  • Target

    RNSM00338.7z

  • Size

    14.8MB

  • Sample

    241111-zcr1jswbnq

  • MD5

    e9c1cb091e11486b5596436e66d9d481

  • SHA1

    0f5969fc4e0deeead63684173aee0bdd4fd9f73b

  • SHA256

    e95ea5cddb3d3b12f01e3f9b509adf737f0881d99c2e1dfcf80c55e02ac74e9c

  • SHA512

    326c201270f60e9ed6f4a1accab28cce8074b9bb6031376ca5c92333d94f00f31b9f2381c20060530ccd8fd8d78457c17d0aa0d4aa9a7ff707d0ee275b073e1d

  • SSDEEP

    393216:ZVUTV3zucfN4p0dmWTyW5xor/b8xwCYTLe:Z6Z3zDfSp05Ty8ozYSg

Malware Config

Extracted

Path

C:\$Recycle.Bin\KRAB-DECRYPT.txt

Ransom Note
---= GANDCRAB V4 =--- Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .KRAB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/9666d3472d3d855f | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/9666d3472d3d855f

Targets

    • Target

      RNSM00338.7z

    • Size

      14.8MB

    • MD5

      e9c1cb091e11486b5596436e66d9d481

    • SHA1

      0f5969fc4e0deeead63684173aee0bdd4fd9f73b

    • SHA256

      e95ea5cddb3d3b12f01e3f9b509adf737f0881d99c2e1dfcf80c55e02ac74e9c

    • SHA512

      326c201270f60e9ed6f4a1accab28cce8074b9bb6031376ca5c92333d94f00f31b9f2381c20060530ccd8fd8d78457c17d0aa0d4aa9a7ff707d0ee275b073e1d

    • SSDEEP

      393216:ZVUTV3zucfN4p0dmWTyW5xor/b8xwCYTLe:Z6Z3zDfSp05Ty8ozYSg

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (304) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Hide Artifacts: Hidden Users

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks