General
-
Target
2024-07-09_4b3d6d03914720afa3f266382bdd06b7_gandcrab
-
Size
73KB
-
Sample
240709-atskzazama
-
MD5
4b3d6d03914720afa3f266382bdd06b7
-
SHA1
3faffab0fd84e7269f560d4951061ba594c26aa1
-
SHA256
cc48c269a6926b83b1105983ff08074ac1e259420a154d1e8394729272662942
-
SHA512
64b137a6d5237394f74306314e750eb6940b3767bd75625f53f3a49ebf24bd1a21e752cd9f62072d31414c49e9e195ce90033b7c80c3f036a71d66a3b1bf3c4c
-
SSDEEP
1536:t55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:FMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Behavioral task
behavioral1
Sample
2024-07-09_4b3d6d03914720afa3f266382bdd06b7_gandcrab.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-09_4b3d6d03914720afa3f266382bdd06b7_gandcrab.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
2024-07-09_4b3d6d03914720afa3f266382bdd06b7_gandcrab
-
Size
73KB
-
MD5
4b3d6d03914720afa3f266382bdd06b7
-
SHA1
3faffab0fd84e7269f560d4951061ba594c26aa1
-
SHA256
cc48c269a6926b83b1105983ff08074ac1e259420a154d1e8394729272662942
-
SHA512
64b137a6d5237394f74306314e750eb6940b3767bd75625f53f3a49ebf24bd1a21e752cd9f62072d31414c49e9e195ce90033b7c80c3f036a71d66a3b1bf3c4c
-
SSDEEP
1536:t55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:FMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-