General

  • Target

    2024-01-23_dba5f4e93d8f61cb70b904c4f909b857_gandcrab

  • Size

    147KB

  • MD5

    dba5f4e93d8f61cb70b904c4f909b857

  • SHA1

    311764a8e84835c2bc9b81a7ea4611e76443f46e

  • SHA256

    fb26d1dfc66f04856f6d7092bca52f1996a9d49108c87799b196a360c69f68e8

  • SHA512

    4a45b84439cb995f498d401bad45f7561e85860e41f1ae9a78f6eb48007d24436c05cf223dc24f342710c7b3dc3789ff751f62b96d2ae57c2832e128bcd23659

  • SSDEEP

    3072:tBounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:tqxHmqqDL6EHl2U6CbeOl5f2Fj

Score
10/10

Malware Config

Signatures

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_dba5f4e93d8f61cb70b904c4f909b857_gandcrab
    .exe windows:5 windows x86 arch:x86


    Headers

    Exports

    Sections