General
-
Target
4361d7e52da09c705edc3c59b628af8610ea046cd31f172015ba4947c25e4e10
-
Size
244KB
-
Sample
220707-22r3ysfgck
-
MD5
446650fa6dbe905e793c9ec325926c82
-
SHA1
e4caca1d691e6170d0b336589a5f997a19aa9b7c
-
SHA256
4361d7e52da09c705edc3c59b628af8610ea046cd31f172015ba4947c25e4e10
-
SHA512
26c94f7f32ea12d394b2120d741f2b426ebd5a06fca967a3d33854c2f84c2ae0d22651ce0d86c75f926ec0a7f78f12a6ae7cb2be64f44fc82b6096160d463f83
Static task
static1
Behavioral task
behavioral1
Sample
4361d7e52da09c705edc3c59b628af8610ea046cd31f172015ba4947c25e4e10.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4361d7e52da09c705edc3c59b628af8610ea046cd31f172015ba4947c25e4e10.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
4361d7e52da09c705edc3c59b628af8610ea046cd31f172015ba4947c25e4e10
-
Size
244KB
-
MD5
446650fa6dbe905e793c9ec325926c82
-
SHA1
e4caca1d691e6170d0b336589a5f997a19aa9b7c
-
SHA256
4361d7e52da09c705edc3c59b628af8610ea046cd31f172015ba4947c25e4e10
-
SHA512
26c94f7f32ea12d394b2120d741f2b426ebd5a06fca967a3d33854c2f84c2ae0d22651ce0d86c75f926ec0a7f78f12a6ae7cb2be64f44fc82b6096160d463f83
Score10/10-
GandCrab payload
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-