General
-
Target
458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985
-
Size
239KB
-
Sample
220707-nqc8rshcg6
-
MD5
14c7490547a7a901a79839a5252d22cb
-
SHA1
3d97a8672fcfaee10907f55b94a5a4db3591a62b
-
SHA256
458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985
-
SHA512
4d525200ba34a1de987804b15ffcc0aed4c133c4908ebafab0e79bd3135620de986a1e02e7896bcf30a4facbeb1aa4881b413ea4b804cd218fdd57ce3d96bd62
Static task
static1
Behavioral task
behavioral1
Sample
458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985
-
Size
239KB
-
MD5
14c7490547a7a901a79839a5252d22cb
-
SHA1
3d97a8672fcfaee10907f55b94a5a4db3591a62b
-
SHA256
458c5a5a5201d4d1e470a0b009b1152dc48771b3ccb8b17e7b3bc6af4db13985
-
SHA512
4d525200ba34a1de987804b15ffcc0aed4c133c4908ebafab0e79bd3135620de986a1e02e7896bcf30a4facbeb1aa4881b413ea4b804cd218fdd57ce3d96bd62
Score10/10-
GandCrab payload
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-