General

  • Target

    2025-04-10_efaf0510c855f7a9a9a7632bc945d08b_elex_gandcrab_rhadamanthys

  • Size

    80KB

  • Sample

    250410-jt68ssvzdv

  • MD5

    efaf0510c855f7a9a9a7632bc945d08b

  • SHA1

    df493a1f366b8cd84a6229fa5fd66a06753f3cfb

  • SHA256

    ec684964b50b6fa00bb15a816897d132bbcd7334b9a6f3e9f7709f4de6534835

  • SHA512

    81e4aa3b5f29c2882e17eaae8fab80213cb4c5b6d00901265de6cf555581dc6c4d243c13c1c0fe19c1355b1786a8d1fb02b739f56fd9dea31a0dd2350f2f99df

  • SSDEEP

    1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rU:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5Y

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2025-04-10_efaf0510c855f7a9a9a7632bc945d08b_elex_gandcrab_rhadamanthys

    • Size

      80KB

    • MD5

      efaf0510c855f7a9a9a7632bc945d08b

    • SHA1

      df493a1f366b8cd84a6229fa5fd66a06753f3cfb

    • SHA256

      ec684964b50b6fa00bb15a816897d132bbcd7334b9a6f3e9f7709f4de6534835

    • SHA512

      81e4aa3b5f29c2882e17eaae8fab80213cb4c5b6d00901265de6cf555581dc6c4d243c13c1c0fe19c1355b1786a8d1fb02b739f56fd9dea31a0dd2350f2f99df

    • SSDEEP

      1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rU:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5Y

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks