General
-
Target
2024-10-12_b7de2b38e2cb30c6372c8215271aab4b_gandcrab
-
Size
73KB
-
Sample
241012-pkqscazflg
-
MD5
b7de2b38e2cb30c6372c8215271aab4b
-
SHA1
a91255b6e94d05ef6aace85e2996559b82d8f6dc
-
SHA256
bfd2c5e26fef321e984ad6cb5143c4a0dad34fb226c29bb1af238cae8483848c
-
SHA512
c26facc62db1f73144ba9111a62d2d9385c627dfb4b40e5660f3e60ec4d03b98eca0f9c9d607b6bbc9d48e94ad1edb32650088b30846292642363b00983aad90
-
SSDEEP
1536:U555555555555pmgSeGDjtQhnwmmB0yIZqMqqU+2bbbAV2/S2mr3IdE8mne0Avu8:RMSjOnrmBJMqqDL2/mr3IdE8we0Avu5h
Behavioral task
behavioral1
Sample
2024-10-12_b7de2b38e2cb30c6372c8215271aab4b_gandcrab.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_b7de2b38e2cb30c6372c8215271aab4b_gandcrab.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
2024-10-12_b7de2b38e2cb30c6372c8215271aab4b_gandcrab
-
Size
73KB
-
MD5
b7de2b38e2cb30c6372c8215271aab4b
-
SHA1
a91255b6e94d05ef6aace85e2996559b82d8f6dc
-
SHA256
bfd2c5e26fef321e984ad6cb5143c4a0dad34fb226c29bb1af238cae8483848c
-
SHA512
c26facc62db1f73144ba9111a62d2d9385c627dfb4b40e5660f3e60ec4d03b98eca0f9c9d607b6bbc9d48e94ad1edb32650088b30846292642363b00983aad90
-
SSDEEP
1536:U555555555555pmgSeGDjtQhnwmmB0yIZqMqqU+2bbbAV2/S2mr3IdE8mne0Avu8:RMSjOnrmBJMqqDL2/mr3IdE8we0Avu5h
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-