General

  • Target

    2024-02-21_fe6aa4e794730d6c3d2a864381bd09a5_gandcrab

  • Size

    147KB

  • MD5

    fe6aa4e794730d6c3d2a864381bd09a5

  • SHA1

    f69b9d7a3a9f430ba80f552a38721c9095a67d15

  • SHA256

    2fa5132568e27910b021bd8a6eb18c40f2bc9164ab9d24fb2ab6c449de3b49ae

  • SHA512

    5f4a6c5bd854798e938a0942fe403db114072d3f81b451318880d414f184d818ca69eb2ffb3d806be7a42b21f4f475166e6478899ec767093cff60285fbc25ef

  • SSDEEP

    3072:zBounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:zqxHmqqDL6EHl2U6CbeOl5f2Fj

Score
10/10

Malware Config

Signatures

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_fe6aa4e794730d6c3d2a864381bd09a5_gandcrab
    .exe windows:5 windows x86 arch:x86


    Headers

    Exports

    Sections