General

  • Target

    2025-04-10_cb522a3af744934ac4ba3c9b44b63021_elex_gandcrab_rhadamanthys

  • Size

    80KB

  • Sample

    250410-jpzcdsvpy3

  • MD5

    cb522a3af744934ac4ba3c9b44b63021

  • SHA1

    f1bb5f6a2a669c9407f12a242f4c7053ac34a47e

  • SHA256

    95183ce221c985b01a600b5ef2f0e574415d4bd6c85a74bf6bb57b0145fb44c5

  • SHA512

    e3be234969f3c9b8d96a55cbe31c3194c8828f07df2c35ce1c0bd6f9d634ab624beff753fc0995bdbf55953c35d048553961ad96efb23f6bbbb17a97e63724cc

  • SSDEEP

    1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rn:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5j

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2025-04-10_cb522a3af744934ac4ba3c9b44b63021_elex_gandcrab_rhadamanthys

    • Size

      80KB

    • MD5

      cb522a3af744934ac4ba3c9b44b63021

    • SHA1

      f1bb5f6a2a669c9407f12a242f4c7053ac34a47e

    • SHA256

      95183ce221c985b01a600b5ef2f0e574415d4bd6c85a74bf6bb57b0145fb44c5

    • SHA512

      e3be234969f3c9b8d96a55cbe31c3194c8828f07df2c35ce1c0bd6f9d634ab624beff753fc0995bdbf55953c35d048553961ad96efb23f6bbbb17a97e63724cc

    • SSDEEP

      1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rn:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5j

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks