General

  • Target

    2024-01-22_42efd13666f71afe67cd53114a341d13_gandcrab

  • Size

    147KB

  • MD5

    42efd13666f71afe67cd53114a341d13

  • SHA1

    3c63978d58e581ad6f918840b19e60bed4a2a2f9

  • SHA256

    0f6e17d209db13b6322a8bdd945d111df69cf5d90beca63f82c63db879e97ff0

  • SHA512

    bdbdf72601efde636e7c2859aad274f67c9c3bf8e55e461f8618bdfbd5ea75218e2af4c02404fc7de82725c7acf5facb2f2a0fcdd0b07f45f42559adb9c6d9e6

  • SSDEEP

    3072:+BounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:+qxHmqqDL6EHl2U6CbeOl5f2Fj

Score
10/10

Malware Config

Signatures

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-22_42efd13666f71afe67cd53114a341d13_gandcrab
    .exe windows:5 windows x86 arch:x86


    Headers

    Exports

    Sections