General
-
Target
41c35a69a2313fec2dbf6b2ba8813a5e3ee3adf6a48491ca2b7b9a0110e54adf
-
Size
231KB
-
Sample
220708-fbdxrabhd8
-
MD5
1d364a0c31c32d46b5efe2598125818f
-
SHA1
11404f54bd4a3168a152b9af177f13bc481fa576
-
SHA256
41c35a69a2313fec2dbf6b2ba8813a5e3ee3adf6a48491ca2b7b9a0110e54adf
-
SHA512
3e39a071666b0f6c00c86a445e401898b22bf2de99e8c632a89032364620acef8bc016dce0bd522172421f1b97197ef7e673c4e840b41c37ca4a029753c82fe8
Static task
static1
Behavioral task
behavioral1
Sample
41c35a69a2313fec2dbf6b2ba8813a5e3ee3adf6a48491ca2b7b9a0110e54adf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
41c35a69a2313fec2dbf6b2ba8813a5e3ee3adf6a48491ca2b7b9a0110e54adf.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
41c35a69a2313fec2dbf6b2ba8813a5e3ee3adf6a48491ca2b7b9a0110e54adf
-
Size
231KB
-
MD5
1d364a0c31c32d46b5efe2598125818f
-
SHA1
11404f54bd4a3168a152b9af177f13bc481fa576
-
SHA256
41c35a69a2313fec2dbf6b2ba8813a5e3ee3adf6a48491ca2b7b9a0110e54adf
-
SHA512
3e39a071666b0f6c00c86a445e401898b22bf2de99e8c632a89032364620acef8bc016dce0bd522172421f1b97197ef7e673c4e840b41c37ca4a029753c82fe8
Score10/10-
GandCrab payload
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (carder .bit in DNS Lookup)
-
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
suricata: ET MALWARE Observed GandCrab Ransomware Domain (ransomware .bit in DNS Lookup)
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-