General
-
Target
40014d7acbc86a699a7015c9b890ea08a564b045efc0d35ddb9132f548b9f84d
-
Size
146KB
-
Sample
220630-v3xlhaeafn
-
MD5
6df4264b77cf2990590dd067e03b2f1e
-
SHA1
1c4c7ae5dbb0ee2e764f7ea828d37eb92631cd77
-
SHA256
40014d7acbc86a699a7015c9b890ea08a564b045efc0d35ddb9132f548b9f84d
-
SHA512
9a551572123bf5d81161acd055d83d733dd18b5c4d3c0362edac0135080e12fd1eb51d64387f33a2e94cb6bbc6aebbd967f3df30bea81a06669cdc160aaf12fc
Static task
static1
Behavioral task
behavioral1
Sample
ok.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ok.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
ok.exe
-
Size
257KB
-
MD5
7aa37e1425f48ca148f1a0b356162c89
-
SHA1
e3cce5e265d5db34f4a7586476bd42064f47484e
-
SHA256
acec132d40282e6e2af84055cd69e4e39914f516570f06dc69be30f06e3517f8
-
SHA512
44c813eb2ee619bb62d9b32af70d36b9b546c6b2ed6d5a1ddbcc2ec32798f0319916a3dc25b213bcca9234e2b12d6f532a47ee747411a6af5747c638e6090b3b
Score10/10-
GandCrab Payload
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (zonealarm .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (zonealarm .bit in DNS Lookup)
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-