General
-
Target
5baf09d6dc9a692c482f1644d5d2ffb088e011ba7f84c72897dc16378d019007
-
Size
73KB
-
Sample
221103-ts5zfseffj
-
MD5
7b75a5f078eca6c7fa19a01fe87656e8
-
SHA1
2d848b931bba5eb3737136d0a41faef7b1c06165
-
SHA256
5baf09d6dc9a692c482f1644d5d2ffb088e011ba7f84c72897dc16378d019007
-
SHA512
38af7d21caa9aa4236a1a162ee1fcb88397cdbc47c0b093ee29e616569be895472716e839d7532883d5f1ade55af321d62078de21e25cb0f4bbee8c1a46c6546
-
SSDEEP
1536:agSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:aMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Behavioral task
behavioral1
Sample
5baf09d6dc9a692c482f1644d5d2ffb088e011ba7f84c72897dc16378d019007.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5baf09d6dc9a692c482f1644d5d2ffb088e011ba7f84c72897dc16378d019007.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
5baf09d6dc9a692c482f1644d5d2ffb088e011ba7f84c72897dc16378d019007
-
Size
73KB
-
MD5
7b75a5f078eca6c7fa19a01fe87656e8
-
SHA1
2d848b931bba5eb3737136d0a41faef7b1c06165
-
SHA256
5baf09d6dc9a692c482f1644d5d2ffb088e011ba7f84c72897dc16378d019007
-
SHA512
38af7d21caa9aa4236a1a162ee1fcb88397cdbc47c0b093ee29e616569be895472716e839d7532883d5f1ade55af321d62078de21e25cb0f4bbee8c1a46c6546
-
SSDEEP
1536:agSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:aMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-