2018-03-16 - GANDCRAB RANSOMWARE

NOTICE:

ASSOCIATED FILES:

 


Shown above:  Email headers from a message I found right before drafting this blog post.

 

WEB TRAFFIC BLOCK LIST

Indicators are not a block list.  If you feel the need to block web traffic, I suggest the following URL and domain:

 

EMAILS


Shown above:  Screenshot from the spreadsheet tracker (1 of 2).

 


Shown above:  Screenshot from the spreadsheet tracker (2 of 2).

 


Shown above:  Screenshot from one of the emails.

 

DATA FROM 10 EMAIL SAMPLES:

 

MALWARE


Shown above:  JavaScript file extracted from one of the zip attachments.

 

EMAIL ATTACHMENTS (ALL ZIP ARCHIVES WITH .7Z FILE EXTENSIONS):

JAVASCRIPT FILE EXTRACTED FROM THE ZIP ATTACHMENTS (SAME FILE, DIFFERENT NAMES):

GANDCRAB RANSOMWARE BINARY RETRIEVED BY THE .JS FILE:


Shown above:  GandCrab ransomware persistent on an infected Windows host.

 

TRAFFIC


Shown above:  Traffic from an infection filtered in Wireshark.

 

URL FROM THE EXTRACTED .JS FILES TO DOWNLOAD THE GANDCRAB RANSOMWARE EXECUTABLE:

GANDCRAB RANSOMWARE INFECTION TRAFFIC:

 

IMAGES


Shown above:  Encrypted files on an infected Windows host.

 


Shown above:  GandCrab decryptor aksed me for 1,500 US dollars.

 

Click here to return to the main page.