General

  • Target

    2024-03-09_a6f6b5209eba5c8e65df8e3ad9ce95c9_gandcrab

  • Size

    147KB

  • MD5

    a6f6b5209eba5c8e65df8e3ad9ce95c9

  • SHA1

    0a5f284e1b0d231b9fbf80c38b2fff4d73b47956

  • SHA256

    e71571fb984f479d8fc8a88e3f406333fc101536f1f7f4cbbd9a70e9d0de2732

  • SHA512

    84511d7f5acbca09abad8dbdf413b71ca49a4e631442b433514007336402fe2de6d0e9943e1325407b69087431e3b5a99163fed6dc7558db08636140d7fc30cd

  • SSDEEP

    3072:kBounVyFHFMqqDL2/LgHkc2U6FiPZ8aewZ2ql5f2J9lj:kqxHmqqDL6EHl2U6CbeOl5f2Fj

Score
10/10

Malware Config

Signatures

  • Detects Reflective DLL injection artifacts 1 IoCs
  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-09_a6f6b5209eba5c8e65df8e3ad9ce95c9_gandcrab
    .exe windows:5 windows x86 arch:x86


    Headers

    Exports

    Sections