General
-
Target
ae2c8f84a9720f427135618261c8b5f1f9741f565e74d6c93a59e2769e558697
-
Size
73KB
-
Sample
241030-d25r2swalb
-
MD5
75497aa6ce30a819fa64a3f1efe0791d
-
SHA1
7cec2a211468721d2f19bfe5027831862d42a173
-
SHA256
ae2c8f84a9720f427135618261c8b5f1f9741f565e74d6c93a59e2769e558697
-
SHA512
00e2fcf4bedce0fa3f89da6d9ee92b5cf054c3e6b49e0f7d39857c5089946e7902ad33a3acb2552e31e46a903bde1a28cd3accf4e503f78796db4fb2298f6c06
-
SSDEEP
1536:r55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:XMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F
Behavioral task
behavioral1
Sample
ae2c8f84a9720f427135618261c8b5f1f9741f565e74d6c93a59e2769e558697.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae2c8f84a9720f427135618261c8b5f1f9741f565e74d6c93a59e2769e558697.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
ae2c8f84a9720f427135618261c8b5f1f9741f565e74d6c93a59e2769e558697
-
Size
73KB
-
MD5
75497aa6ce30a819fa64a3f1efe0791d
-
SHA1
7cec2a211468721d2f19bfe5027831862d42a173
-
SHA256
ae2c8f84a9720f427135618261c8b5f1f9741f565e74d6c93a59e2769e558697
-
SHA512
00e2fcf4bedce0fa3f89da6d9ee92b5cf054c3e6b49e0f7d39857c5089946e7902ad33a3acb2552e31e46a903bde1a28cd3accf4e503f78796db4fb2298f6c06
-
SSDEEP
1536:r55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:XMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-