General
-
Target
2024-01-25_ee41bf4bcb43f1192bd9fbf40d8b605d_gandcrab
-
Size
147KB
-
Sample
240125-v9bbvabhd5
-
MD5
ee41bf4bcb43f1192bd9fbf40d8b605d
-
SHA1
5711eddc7be8db02b855183ab0bbd42d249cad44
-
SHA256
7fe68809da53c661a887d491e376681b0517d04ac3a705cb8c2fe5e2c699fec0
-
SHA512
0a9c92c7b767ade448bf07b11f31b7f87350ede6f24f68a74dc0242f32d6e9018527a70fa2f1402af2615a2f842458cf3d54c82560c456e3565cab68ec15e059
-
SSDEEP
3072:NBounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:NqxHmqqDL6EHl2U6CbeOl5f2Fj
Behavioral task
behavioral1
Sample
2024-01-25_ee41bf4bcb43f1192bd9fbf40d8b605d_gandcrab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_ee41bf4bcb43f1192bd9fbf40d8b605d_gandcrab.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_ee41bf4bcb43f1192bd9fbf40d8b605d_gandcrab
-
Size
147KB
-
MD5
ee41bf4bcb43f1192bd9fbf40d8b605d
-
SHA1
5711eddc7be8db02b855183ab0bbd42d249cad44
-
SHA256
7fe68809da53c661a887d491e376681b0517d04ac3a705cb8c2fe5e2c699fec0
-
SHA512
0a9c92c7b767ade448bf07b11f31b7f87350ede6f24f68a74dc0242f32d6e9018527a70fa2f1402af2615a2f842458cf3d54c82560c456e3565cab68ec15e059
-
SSDEEP
3072:NBounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:NqxHmqqDL6EHl2U6CbeOl5f2Fj
-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
UPX dump on OEP (original entry point)
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-