General
-
Target
2024-07-01_174fb68fc630bfb76fe69f47debb8412_gandcrab
-
Size
73KB
-
Sample
240701-w2l9tawern
-
MD5
174fb68fc630bfb76fe69f47debb8412
-
SHA1
3227da74a3948509e00b815dbd5f5ab097d102fe
-
SHA256
5ce2a9038f6f649f2f607438bc7b112a93f2e10d84318a19fb111965b978bd22
-
SHA512
c434f23a7ab666be3f4d50d7374b6c2554df853464875cd52f4d72d541623334e331c3dd7f79313ad7f0acee8a0779f48bf3b814aa208d5dd1342040ce2049d8
-
SSDEEP
1536:z55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:vMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Behavioral task
behavioral1
Sample
2024-07-01_174fb68fc630bfb76fe69f47debb8412_gandcrab.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-07-01_174fb68fc630bfb76fe69f47debb8412_gandcrab.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
2024-07-01_174fb68fc630bfb76fe69f47debb8412_gandcrab
-
Size
73KB
-
MD5
174fb68fc630bfb76fe69f47debb8412
-
SHA1
3227da74a3948509e00b815dbd5f5ab097d102fe
-
SHA256
5ce2a9038f6f649f2f607438bc7b112a93f2e10d84318a19fb111965b978bd22
-
SHA512
c434f23a7ab666be3f4d50d7374b6c2554df853464875cd52f4d72d541623334e331c3dd7f79313ad7f0acee8a0779f48bf3b814aa208d5dd1342040ce2049d8
-
SSDEEP
1536:z55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:vMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-