General

  • Target

    2024-01-24_971ef3979172c30c69b8f4a3f2371689_gandcrab

  • Size

    147KB

  • MD5

    971ef3979172c30c69b8f4a3f2371689

  • SHA1

    cbba2d2f8729ec4e6b8c1b7efa251a7e1782c518

  • SHA256

    07a218aaecd3bbdfb864e1e8c9ce08b712260a870947b5f165927328973860cf

  • SHA512

    073415d133cc9d6993b029bec18f789ddcbce0023dac1a2a4697cf7dc4370c334bf0ece382b065f77144f6311ea055644bdabd335f88377845171290388a9941

  • SSDEEP

    3072:hBounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:hqxHmqqDL6EHl2U6CbeOl5f2Fj

Score
10/10

Malware Config

Signatures

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_971ef3979172c30c69b8f4a3f2371689_gandcrab
    .exe windows:5 windows x86 arch:x86


    Headers

    Exports

    Sections