General

  • Target

    87e0e45e108f6b001b41f2f350f7281408b65f12ab8ff536b14d4b9161c27ec9

  • Size

    30KB

  • MD5

    189fd7a4ae062059829f58016a11b0b7

  • SHA1

    83a2f638a73c7fc0ac3b098a4c0c1d181f58fbbf

  • SHA256

    87e0e45e108f6b001b41f2f350f7281408b65f12ab8ff536b14d4b9161c27ec9

  • SHA512

    3452c431cad859c9ea8cfc1b3e9b0f5006987ea00b88120cbd9c8dc64021e103e772195ff6ef3d44b37b6351d4ba044e97af87300953b5f8105a83470caa4fb4

  • SSDEEP

    384:QlTa+Sj+CR+wDy/uNjNCvdyRbJ15wXDOjggxmewNgAiAW6tk4nrcQGrv1c:InSj+CR+myGNjNCvA1McqDdWSnY9r9

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Signatures

  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 87e0e45e108f6b001b41f2f350f7281408b65f12ab8ff536b14d4b9161c27ec9
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections