General

  • Target

    ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1

  • Size

    99KB

  • MD5

    902306c70c275e27067aca12a916cfe1

  • SHA1

    2fd4f8e2d9a1ff939d57b1ba7f636c070ce3a99b

  • SHA256

    ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1

  • SHA512

    1c5ddbbb9d974ce09694631f37ed260693859d4ec51f10d1f788f6bd08de1fb73840a456f9fdd07fb73609be714800df40ebd7643a7eeeed1df95da05b33c012

  • SSDEEP

    3072:5MSjOnrmBIMqqDL2/mr3IdE8we0Avu5r++ygLIaaypQ8CrS6:5XjOnr6jqqDL6aprYS6

Score
10/10

Malware Config

Extracted

Family

gandcrab

C2

http://gdcbghvjyqy7jclk.onion.top/

Signatures

  • Detects ransomware indicator 1 IoCs
  • GandCrab payload 1 IoCs
  • Gandcrab Payload 1 IoCs
  • Gandcrab family
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ab7747dd5f0c84015ba69f7149da1496b96de1e208637f71518f3270375cbba1
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections