General
-
Target
2024-03-22_5744b5e284b7376dc1fd506787edbbc5_gandcrab
-
Size
83KB
-
Sample
240322-2e5ershg53
-
MD5
5744b5e284b7376dc1fd506787edbbc5
-
SHA1
a55c45a16bdf79e538c36dc5f8ae0da2bfae790e
-
SHA256
efb027c001c952e671c9837092c30dddf8a22bb810b0c41143960c7a7485521c
-
SHA512
0cdbbbc3ecc1b177eda62f5673ca59fddf8ed2901327f26a2cdca10c2fa16ef75169b37ac05badcd3fd3b174c0573e50066b94d6f358fde21a431f21af172d81
-
SSDEEP
1536:x55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r5:5MSjOnrmBTMqqDL2/mr3IdE8we0Avu5l
Behavioral task
behavioral1
Sample
2024-03-22_5744b5e284b7376dc1fd506787edbbc5_gandcrab.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-22_5744b5e284b7376dc1fd506787edbbc5_gandcrab.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
2024-03-22_5744b5e284b7376dc1fd506787edbbc5_gandcrab
-
Size
83KB
-
MD5
5744b5e284b7376dc1fd506787edbbc5
-
SHA1
a55c45a16bdf79e538c36dc5f8ae0da2bfae790e
-
SHA256
efb027c001c952e671c9837092c30dddf8a22bb810b0c41143960c7a7485521c
-
SHA512
0cdbbbc3ecc1b177eda62f5673ca59fddf8ed2901327f26a2cdca10c2fa16ef75169b37ac05badcd3fd3b174c0573e50066b94d6f358fde21a431f21af172d81
-
SSDEEP
1536:x55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5r5:5MSjOnrmBTMqqDL2/mr3IdE8we0Avu5l
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-