General
-
Target
01dc29a053b8a055748933748320b4ec4bee2c8f9ba746d7a6cb9f22a5b95b9d
-
Size
73KB
-
Sample
221103-rng1qabcd4
-
MD5
3be83345749512080c4145c4db4b9df6
-
SHA1
5020f3b02e8c27123e23002d5afe6f64479aa033
-
SHA256
01dc29a053b8a055748933748320b4ec4bee2c8f9ba746d7a6cb9f22a5b95b9d
-
SHA512
3d743b6a07915249bf6e464c5966ea9aa65f55f2d8f2f4a88dfc393b64e8cdf05b7538780b60f7ac07dc3361ddb619946ea5a81d3be0b950ed6281ff0d5ba0b6
-
SSDEEP
1536:6gSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:6MSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Behavioral task
behavioral1
Sample
01dc29a053b8a055748933748320b4ec4bee2c8f9ba746d7a6cb9f22a5b95b9d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01dc29a053b8a055748933748320b4ec4bee2c8f9ba746d7a6cb9f22a5b95b9d.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
01dc29a053b8a055748933748320b4ec4bee2c8f9ba746d7a6cb9f22a5b95b9d
-
Size
73KB
-
MD5
3be83345749512080c4145c4db4b9df6
-
SHA1
5020f3b02e8c27123e23002d5afe6f64479aa033
-
SHA256
01dc29a053b8a055748933748320b4ec4bee2c8f9ba746d7a6cb9f22a5b95b9d
-
SHA512
3d743b6a07915249bf6e464c5966ea9aa65f55f2d8f2f4a88dfc393b64e8cdf05b7538780b60f7ac07dc3361ddb619946ea5a81d3be0b950ed6281ff0d5ba0b6
-
SSDEEP
1536:6gSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:6MSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-