General

  • Target

    RNSM00336.7z

  • Size

    4.1MB

  • Sample

    241111-zjfk4ayrap

  • MD5

    d687eacb1c6492efb8be4eb94f88ed97

  • SHA1

    079756db279766a7f27041aed1412a9429f8cdb6

  • SHA256

    62410fecfd00f01c48ee3cfc87d508d20eb490c8e03abcba1ebfa8b2a1e7fab7

  • SHA512

    1625f9ff83102efc170b0271e4c0c561e87e8167b8dac18412ad90c9f488b29dcb79af2cb5100a2e079e5a831471cff15f5803baa5ff65490cd633d082039ed7

  • SSDEEP

    98304:GQlJj+xGl2j3/p1a5d+LoDdoimUqBOHzBP9dJKHqi+:hj+cAT/KaQos3TBP97K3+

Malware Config

Extracted

Path

C:\MSOCache\KRAB-DECRYPT.txt

Ransom Note
---= GANDCRAB V4 =--- Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .KRAB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/5cf0d747bfa4c5ab | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- 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 ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/5cf0d747bfa4c5ab

Targets

    • Target

      RNSM00336.7z

    • Size

      4.1MB

    • MD5

      d687eacb1c6492efb8be4eb94f88ed97

    • SHA1

      079756db279766a7f27041aed1412a9429f8cdb6

    • SHA256

      62410fecfd00f01c48ee3cfc87d508d20eb490c8e03abcba1ebfa8b2a1e7fab7

    • SHA512

      1625f9ff83102efc170b0271e4c0c561e87e8167b8dac18412ad90c9f488b29dcb79af2cb5100a2e079e5a831471cff15f5803baa5ff65490cd633d082039ed7

    • SSDEEP

      98304:GQlJj+xGl2j3/p1a5d+LoDdoimUqBOHzBP9dJKHqi+:hj+cAT/KaQos3TBP97K3+

    • Emotet

      Emotet is a trojan that is primarily spread through spam emails.

    • Emotet family

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (293) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks