General
-
Target
ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1
-
Size
99KB
-
Sample
240615-a36tysshmh
-
MD5
902306c70c275e27067aca12a916cfe1
-
SHA1
2fd4f8e2d9a1ff939d57b1ba7f636c070ce3a99b
-
SHA256
ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1
-
SHA512
1c5ddbbb9d974ce09694631f37ed260693859d4ec51f10d1f788f6bd08de1fb73840a456f9fdd07fb73609be714800df40ebd7643a7eeeed1df95da05b33c012
-
SSDEEP
3072:5MSjOnrmBIMqqDL2/mr3IdE8we0Avu5r++ygLIaaypQ8CrS6:5XjOnr6jqqDL6aprYS6
Behavioral task
behavioral1
Sample
ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1
-
Size
99KB
-
MD5
902306c70c275e27067aca12a916cfe1
-
SHA1
2fd4f8e2d9a1ff939d57b1ba7f636c070ce3a99b
-
SHA256
ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1
-
SHA512
1c5ddbbb9d974ce09694631f37ed260693859d4ec51f10d1f788f6bd08de1fb73840a456f9fdd07fb73609be714800df40ebd7643a7eeeed1df95da05b33c012
-
SSDEEP
3072:5MSjOnrmBIMqqDL2/mr3IdE8we0Avu5r++ygLIaaypQ8CrS6:5XjOnr6jqqDL6aprYS6
Score10/10-
GandCrab payload
-
Detects ransomware indicator
-
Gandcrab Payload
-
UPX dump on OEP (original entry point)
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-