General
-
Target
2024-03-22_64c5ddfd42ab4b94b944ba4ec504e2d4_gandcrab
-
Size
73KB
-
Sample
240322-lpkv4sag63
-
MD5
64c5ddfd42ab4b94b944ba4ec504e2d4
-
SHA1
5d052a08476040f88ed9d0e53a3d015967cf356f
-
SHA256
986021b706bcada9fdd7c0b5da9c0cf4a0aa48e42510bfc525a294f64ba883a2
-
SHA512
19f65a4245095af0b2e84b51fff1dd10d93d99fd0a92e453fc8f168137689b60dd3615b3611626a107f8f8cf7529e97b92cb76bfd52e39f999c15f56e99b1648
-
SSDEEP
1536:355u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:zMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F
Behavioral task
behavioral1
Sample
2024-03-22_64c5ddfd42ab4b94b944ba4ec504e2d4_gandcrab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-22_64c5ddfd42ab4b94b944ba4ec504e2d4_gandcrab.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
2024-03-22_64c5ddfd42ab4b94b944ba4ec504e2d4_gandcrab
-
Size
73KB
-
MD5
64c5ddfd42ab4b94b944ba4ec504e2d4
-
SHA1
5d052a08476040f88ed9d0e53a3d015967cf356f
-
SHA256
986021b706bcada9fdd7c0b5da9c0cf4a0aa48e42510bfc525a294f64ba883a2
-
SHA512
19f65a4245095af0b2e84b51fff1dd10d93d99fd0a92e453fc8f168137689b60dd3615b3611626a107f8f8cf7529e97b92cb76bfd52e39f999c15f56e99b1648
-
SSDEEP
1536:355u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:zMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-