General

  • Target

    2024-11-17_cabae9b66a8aa42af5701b9fd24a27ac_gandcrab

  • Size

    83KB

  • Sample

    241117-eb1wvavleq

  • MD5

    cabae9b66a8aa42af5701b9fd24a27ac

  • SHA1

    ff44f59a8b5aa30929e3b15b10c8db9a7dd7a68a

  • SHA256

    eff5681e999a711d74f6180eaab193713452efd7c31d443666d061c448d59fca

  • SHA512

    8551c7b5ee8bf073d4b61a4127f7f6f4d37db0f53df7712143ece78a37fa06520accf3481a82040822e41aef27520a9e96dec8405487c51e906b9a00a6fa4eb3

  • SSDEEP

    1536:r55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r5:XMSjOnrmBTMqqDL2/mr3IdE8we0Avu5l

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-11-17_cabae9b66a8aa42af5701b9fd24a27ac_gandcrab

    • Size

      83KB

    • MD5

      cabae9b66a8aa42af5701b9fd24a27ac

    • SHA1

      ff44f59a8b5aa30929e3b15b10c8db9a7dd7a68a

    • SHA256

      eff5681e999a711d74f6180eaab193713452efd7c31d443666d061c448d59fca

    • SHA512

      8551c7b5ee8bf073d4b61a4127f7f6f4d37db0f53df7712143ece78a37fa06520accf3481a82040822e41aef27520a9e96dec8405487c51e906b9a00a6fa4eb3

    • SSDEEP

      1536:r55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r5:XMSjOnrmBTMqqDL2/mr3IdE8we0Avu5l

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks