General
-
Target
933210a9d19b25e0711ae88eece1ba06bb035a01ab2880cc707ff55bdd3b8dd0
-
Size
130KB
-
Sample
220128-ybkpeabgbm
-
MD5
0b33e34e26c6e53c346517edd3dd9841
-
SHA1
cc96c9bf2226aacc5064fed104bc173dc09ddd6b
-
SHA256
933210a9d19b25e0711ae88eece1ba06bb035a01ab2880cc707ff55bdd3b8dd0
-
SHA512
d58df66c4192d1f734b28a28296d08037fb74fb01bbf6bb3761079850370ffe8288602882142636604ec9cc7d0b89ac9e4fc46fb280cb4fe8c9f23e1c219c4e2
Static task
static1
Behavioral task
behavioral1
Sample
933210a9d19b25e0711ae88eece1ba06bb035a01ab2880cc707ff55bdd3b8dd0.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
933210a9d19b25e0711ae88eece1ba06bb035a01ab2880cc707ff55bdd3b8dd0.dll
Resource
win10-en-20211208
Malware Config
Extracted
C:\JLNIACJJK-DECRYPT.txt
http://gandcrabmfe6mnef.onion/d28bd0f830f133
Targets
-
-
Target
933210a9d19b25e0711ae88eece1ba06bb035a01ab2880cc707ff55bdd3b8dd0
-
Size
130KB
-
MD5
0b33e34e26c6e53c346517edd3dd9841
-
SHA1
cc96c9bf2226aacc5064fed104bc173dc09ddd6b
-
SHA256
933210a9d19b25e0711ae88eece1ba06bb035a01ab2880cc707ff55bdd3b8dd0
-
SHA512
d58df66c4192d1f734b28a28296d08037fb74fb01bbf6bb3761079850370ffe8288602882142636604ec9cc7d0b89ac9e4fc46fb280cb4fe8c9f23e1c219c4e2
Score10/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-