General

  • Target

    2024-12-04_508bcc09346a1cde48785d67bfbf7f30_gandcrab

  • Size

    73KB

  • Sample

    241204-w3ksdavlhs

  • MD5

    508bcc09346a1cde48785d67bfbf7f30

  • SHA1

    051898d320abb5d1be648b7ce1364c764716f2db

  • SHA256

    d409f01cc1a81c267d063a953e24e88462d94f9c73bfd77e6172a4638baabd44

  • SHA512

    72a1c346689262c06077fe1c363500fbaa06d7038c9e8ade8b5fda1a37fdd90deb19b9e11ee148511b098b2a134a105f7143578ee0bb7fb435f94c3f1e04d23c

  • SSDEEP

    1536:R55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:ZMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2024-12-04_508bcc09346a1cde48785d67bfbf7f30_gandcrab

    • Size

      73KB

    • MD5

      508bcc09346a1cde48785d67bfbf7f30

    • SHA1

      051898d320abb5d1be648b7ce1364c764716f2db

    • SHA256

      d409f01cc1a81c267d063a953e24e88462d94f9c73bfd77e6172a4638baabd44

    • SHA512

      72a1c346689262c06077fe1c363500fbaa06d7038c9e8ade8b5fda1a37fdd90deb19b9e11ee148511b098b2a134a105f7143578ee0bb7fb435f94c3f1e04d23c

    • SSDEEP

      1536:R55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:ZMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks