General
-
Target
41e4f65d0efb6d65436862aab7f0e0e1518989d902ede5583e7f198352d98d89
-
Size
568KB
-
Sample
220708-evvh6sbbc2
-
MD5
f040245046d2f8db8a02400f6416122f
-
SHA1
baaefd2b0624f910c010587b0b45dde7b691dd7e
-
SHA256
41e4f65d0efb6d65436862aab7f0e0e1518989d902ede5583e7f198352d98d89
-
SHA512
4680860d5607ef4cd9b93d9c33516805040e6a4999109c7cee124755c8334c726c81072423d62abd5240400e5b451f329d7d24f5a9c501b931bfebec01a35809
Static task
static1
Behavioral task
behavioral1
Sample
41e4f65d0efb6d65436862aab7f0e0e1518989d902ede5583e7f198352d98d89.exe
Resource
win7-20220414-en
Malware Config
Extracted
C:\VAUZD-DECRYPT.txt
http://gandcrabmfe6mnef.onion/bb3a3edfbc9fe403
Extracted
C:\MBVGK-DECRYPT.txt
http://gandcrabmfe6mnef.onion/a53076ae950c11d
Targets
-
-
Target
41e4f65d0efb6d65436862aab7f0e0e1518989d902ede5583e7f198352d98d89
-
Size
568KB
-
MD5
f040245046d2f8db8a02400f6416122f
-
SHA1
baaefd2b0624f910c010587b0b45dde7b691dd7e
-
SHA256
41e4f65d0efb6d65436862aab7f0e0e1518989d902ede5583e7f198352d98d89
-
SHA512
4680860d5607ef4cd9b93d9c33516805040e6a4999109c7cee124755c8334c726c81072423d62abd5240400e5b451f329d7d24f5a9c501b931bfebec01a35809
-
suricata: ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity
suricata: ET MALWARE [eSentire] Win32/GandCrab v4/5 Ransomware CnC Activity
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-