Resubmissions

02-02-2025 00:22

250202-an9bjaynfr 10

02-02-2025 00:12

250202-ahevqsylfm 10

02-02-2025 00:08

250202-ae1m2awpbt 10

02-02-2025 00:04

250202-acl2vsykbm 10

General

  • Target

    b231263f-0b92-4f02-9e71-3d6a05534490.jpg

  • Size

    26KB

  • Sample

    250202-ae1m2awpbt

  • MD5

    99cfb36285d82796d745c8a199f6acff

  • SHA1

    ab990d5b00d7878178a6e77553152149ce4f56c3

  • SHA256

    afc3ff71d364c14eecc12918e7c00a435943005fc86dafa53da529f0a9c95285

  • SHA512

    3a9558a9e628aac5af58f98a9e7056fe5a2741517067f0f9ebac9a800d6bd564433ab0b3910746f99e82573d2ba176241ce3d3b25961a6c27ae828c0d4defd26

  • SSDEEP

    768:Z3Bt4w6U03dxH1/ARsjefQIbwTj5pW0JPfmXkD+lakhXOsX0:Z3BtNZAdxHdARkef7bQ5I8POEqY

Malware Config

Extracted

Path

\Device\HarddiskVolume1\$RECYCLE.BIN\ADHLFQB-MANUAL.txt

Family

gandcrab

Ransom Note
---= GANDCRAB V5.2 =--- ***********************UNDER NO CIRCUMSTANCES DO NOT DELETE THIS FILE, UNTIL ALL YOUR DATA IS RECOVERED*********************** *****FAILING TO DO SO, WILL RESULT IN YOUR SYSTEM CORRUPTION, IF THERE ARE DECRYPTION ERRORS***** Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .ADHLFQB The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. The server with your key is in a closed network TOR. You can get there by the following ways: ---------------------------------------------------------------------------------------- | 0. Download Tor browser - https://www.torproject.org/ | 1. Install Tor browser | 2. Open Tor Browser | 3. Open link in TOR browser: http://gandcrabmfe6mnef.onion/a79f35db2daa3087 | 4. Follow the instructions on this page ---------------------------------------------------------------------------------------- On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free. ATTENTION! IN ORDER TO PREVENT DATA DAMAGE: * DO NOT MODIFY ENCRYPTED FILES * DO NOT CHANGE DATA BELOW ---BEGIN GANDCRAB KEY--- lAQAAOUewEPiJQn5hhbhk+rem6xYuaVYBrOw97/yV5OZw/miqxovJfL8EpRNap5hoB6I+/RAO8jB3x/325fwOZa7U7wNPXCHlXDOWGiVuoI2DWYmByoie+j6JsNTd/IyLsXOG9+HEWbnYHdrooBhumFBpXkoVu429wTBD+DCcqW+4BgUkjt3liSwBJlQZXPHPpaPNKC8hJAHdnSIOcM+f1u/IRk8xDsdRqOWK6ysR4bJsP3rqOSCZs0gvhiVbNKa2zsl6fkZCKViNrQavdNU8KIYbiKTxIgJHvRNvZaHq7jVextxo2MxEQAVbTJap8DxFXasWlGAOWG3ajZtysaWBqBUGNdatUVpKlVt5wZnDxjS45tPhegYi61CHB6D8eyjGnVzEMmF5lo3621RppbmIY9fBL4jgDJrg8TNhDUPYuXsYkGClsyM15+ptVMA8OcKWGFAFrRLVBOIe1kb9WP54ripQJaASq8WX0jwXJLrPzcoDinqFSwVCgquw4mCF6ZuhzSf3Qb53+MQHEFTnZBJGTzrgtB0tYKFPS8+xJK8RQFQWSZ1WWg48k43XBDMZnzaPF2LsIDyQv7vJoL8MV34l/yALQCBM8HPF0CfTCLBn3PTibnO//Zl7/p9OUHaFIdH9wUQqdqR4PcCrl8xEyE0sYRX5iADq9AsPPkpns3wmVXwdB5llilUIjMCSK+BKsaGftCeL6m5UeksL6r+IXqp7QKqr1hDMbD2HSXGvYDMgv3+S4tesVj1McRV9hx9gk6Ub2ijbCn4ShUry+RgQRs2sj/RzlDoo69ae3zSw+jKDnPBqP5fhVJYQSQprIVsoC41eKgRfPzxjc+Ppe21oypcJskcGSLB44aYyCvdE9F2VS/GOSsXdaQaxPsp5KYsGbdcnwKbXBzlKEyNGsua2ArTujcnavZxC/r5A6gKDUPB1vS3jJB5LzRCBoWoLUo1/IxoClX2awGoLlkDVTbjWUevfEVxLqcmY2/zIq2is3wMBQpB7jc4e3LthLeW/xifdqJ41L6y1Vdk2wKonFrlpLfJe8honXwJPSOYJdEQeA1yHo+QiSlNofs0M5PgvAG6LuF+9OY1H+E3O6K20c9JTtF+uOU6iw8U4zZMNX7WJ8qewUxG9JAFRpd57AhMqU1PauLgZfBgX4MFkrtUYbTRFSlQ5T5cng8hmcLVkOa5jTaVQwkECG6p+tr5KiR9QKEbA47ri+jTFTGr1ELOvQeQRNj4FHKtkWkGnMwAfo+Gij47GkyiQc0hMRKLKKMwKxu2nhBs80OIX2h1CtXbfalP6xJgBe8lEds67cAAkbVIN4ae10oI1+LF6FrgNlHTq7eTxCDkBVuYPtx0pr5Hnno41KXh/3KXVTy5vBjRpNJFzEXgycbb/1lARRDCcSY1nuENKLc8WFpU26sgH/uC6oNX2fh16bLm+jv30S9BSeZMm4DkH7/P2Ft+aDIVa9N4m5PRGc9gwbV8Fdbhe3oR4xVpxtvDfsg0yBv6QWJ0Q7Z4ZSbMVz3wRbjqdi10DW/58bFS4/8MIMAEncMlogb+yQ58cBaRKwbLY3w6m6Spy1CZj+2iIMvXfbXW8NzYDnFgswYgsRsSMrBBKuqwwHQWjyTXAXFr5fsm1BChKdHGExNUSFOMKe75BWEPeSQGSc26uD9rpGYC+np0S43buIctkUPwK/kItC3BtSYksSOnp9Sc5eTqFBugTebJyGG8Z3HGsENz8js/BgIVIgOFT8skPQVEie8RrkBd0di05z59bM0qF69g/JNbM8zEomYhd7b7g4rvSBk8rFkjqmVhMGheNmTS05fptWl7G4oMbl+4nbY+6a+Aw9mbS/+/UMiaaNGDQb9Mh8iDXEKCq6Am3NO/akKDoMgRip1QA6FG78acZTKTYwvBqfJkpSi33jK6cKVaKULJmo42VqCNthtQ830kQCJ57YMDS8y+R5PJqYYZboNclOEFR4Of5MmpxxmCU3vtFAwnxkRoXd3D6iAOGyeTqXW5Q+KbJMmJW8BzZmkcE2kAprmm/aojertJHlbFEyA+eOCh82xYb3z+30G6djrTSFlhRgC/jpTtHp+Y4PgL2CGb9scPDoLicTG81ldAc5Rh36Tl+l0lucIfrTcEm9+YpBotnxBLMWBHKm1vFAyA1hskG9hQxEnFUX868OA16bOBmY/hLeXHVnGQOXiEx1y/o3dMewLLZ3wK9JpJbnm2ZL3SKwb5GYcmPut9hkMAqZyXvCFzX6pqWr+EbQPKkKo= ---END GANDCRAB KEY--- ---BEGIN PC DATA--- 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 ---END PC DATA---
URLs

http://gandcrabmfe6mnef.onion/a79f35db2daa3087

Targets

    • Target

      b231263f-0b92-4f02-9e71-3d6a05534490.jpg

    • Size

      26KB

    • MD5

      99cfb36285d82796d745c8a199f6acff

    • SHA1

      ab990d5b00d7878178a6e77553152149ce4f56c3

    • SHA256

      afc3ff71d364c14eecc12918e7c00a435943005fc86dafa53da529f0a9c95285

    • SHA512

      3a9558a9e628aac5af58f98a9e7056fe5a2741517067f0f9ebac9a800d6bd564433ab0b3910746f99e82573d2ba176241ce3d3b25961a6c27ae828c0d4defd26

    • SSDEEP

      768:Z3Bt4w6U03dxH1/ARsjefQIbwTj5pW0JPfmXkD+lakhXOsX0:Z3BtNZAdxHdARkef7bQ5I8POEqY

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Gandcrab

      Gandcrab is a Trojan horse that encrypts files on a computer.

    • Gandcrab family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Renames multiple (113) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks