General

  • Target

    2025-04-10_6c8f5df927d680b7996f5c1a93d84619_elex_gandcrab_rhadamanthys

  • Size

    80KB

  • Sample

    250410-rsz24atqy3

  • MD5

    6c8f5df927d680b7996f5c1a93d84619

  • SHA1

    12a635e4c74980b608f5b40e06cb3218e570ae82

  • SHA256

    02e8cbc1da24de568f9a5ea4c45f6d7094ec36b34f04cc33ce7ab882a38faa15

  • SHA512

    2020280e224e5228932b5f0eb10373e8a9603ee1f8d7482006381bf15c1e35f16f6630265e9facc8854d5cd505c3bb48a3be8bb522a674a66d261d91efe1a9e7

  • SSDEEP

    1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rM:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5A

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Targets

    • Target

      2025-04-10_6c8f5df927d680b7996f5c1a93d84619_elex_gandcrab_rhadamanthys

    • Size

      80KB

    • MD5

      6c8f5df927d680b7996f5c1a93d84619

    • SHA1

      12a635e4c74980b608f5b40e06cb3218e570ae82

    • SHA256

      02e8cbc1da24de568f9a5ea4c45f6d7094ec36b34f04cc33ce7ab882a38faa15

    • SHA512

      2020280e224e5228932b5f0eb10373e8a9603ee1f8d7482006381bf15c1e35f16f6630265e9facc8854d5cd505c3bb48a3be8bb522a674a66d261d91efe1a9e7

    • SSDEEP

      1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rM:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5A

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks