General
-
Target
902e596f04d6e9fe9c1d4f8985c6e382a1d25ea7ddb8aba727e97221bbb015d2
-
Size
73KB
-
Sample
221105-ce4qssegfq
-
MD5
3578adb1c0bd35fa9326199ab2e46788
-
SHA1
445c94fa8bcb37974f93d22c3be83be82e6ecde4
-
SHA256
902e596f04d6e9fe9c1d4f8985c6e382a1d25ea7ddb8aba727e97221bbb015d2
-
SHA512
5a014d05b067beb4d0932e1e9fee402af4c6fad5d14e0cee99b515f7df356d379989f3dd2c5840d57c71004750711e302b9f2f6ab38b7b6f35094344253e319b
-
SSDEEP
1536:a55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:AMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Behavioral task
behavioral1
Sample
902e596f04d6e9fe9c1d4f8985c6e382a1d25ea7ddb8aba727e97221bbb015d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
902e596f04d6e9fe9c1d4f8985c6e382a1d25ea7ddb8aba727e97221bbb015d2.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
902e596f04d6e9fe9c1d4f8985c6e382a1d25ea7ddb8aba727e97221bbb015d2
-
Size
73KB
-
MD5
3578adb1c0bd35fa9326199ab2e46788
-
SHA1
445c94fa8bcb37974f93d22c3be83be82e6ecde4
-
SHA256
902e596f04d6e9fe9c1d4f8985c6e382a1d25ea7ddb8aba727e97221bbb015d2
-
SHA512
5a014d05b067beb4d0932e1e9fee402af4c6fad5d14e0cee99b515f7df356d379989f3dd2c5840d57c71004750711e302b9f2f6ab38b7b6f35094344253e319b
-
SSDEEP
1536:a55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:AMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-