Behavioral task
behavioral1
Sample
1984-4-0x00000000002D0000-0x00000000002E7000-memory.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1984-4-0x00000000002D0000-0x00000000002E7000-memory.dll
Resource
win10v2004-20240709-en
General
-
Target
1984-4-0x00000000002D0000-0x00000000002E7000-memory.dmp
-
Size
92KB
-
MD5
7eca8377802660834b3269d1f5ac04d8
-
SHA1
e1dd89aa6caafcb028d34f8c8700ab586e10de65
-
SHA256
3c9da3bbec9e84babce33825fdc7c04cacc077d6c427f7be9b116a728a0a0159
-
SHA512
135c760730dde7a09fa5cf19aed73bc3640c7ed29621ff720838472d4561d8412e3f83cba29a09862fcdcc16ccda3f9f1d6e7d9ee55a2646e39eb082cf5f70e6
-
SSDEEP
1536:IxxxxxxxxxxxxhEhD44SnSLF13hvOUYCCQq0UCchR0aNMqqU+2bbbAV2/S2TrKy5:p44sgF1+HBMqqDL2/TrK
Malware Config
Signatures
-
GandCrab payload 1 IoCs
Processes:
resource yara_rule sample family_gandcrab -
Gandcrab family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1984-4-0x00000000002D0000-0x00000000002E7000-memory.dmp
Files
-
1984-4-0x00000000002D0000-0x00000000002E7000-memory.dmp.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ