General
-
Target
2024-11-17_3880c95f95e58296e8c593c73bfcf8a2_gandcrab_wapomi
-
Size
90KB
-
Sample
241117-f37ddasfjp
-
MD5
3880c95f95e58296e8c593c73bfcf8a2
-
SHA1
9e9c03cdce771dc7956ebbb640f9cf2606f66406
-
SHA256
376d5782f32c65daedbb8221fa4bbe17238a8b25a9848cd8b50777fa3fab7b24
-
SHA512
8a193f25bc31c9e7d546072b60b8d51faaeb01204b08f17d16cc324adda88c6859a26b7088cc970dd2d32c1240746acdb139d8e760e7cd1ffe8d830a41f3aaea
-
SSDEEP
1536:q555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:bMSjOnrmBxMqqDL2/mr3IdE8we0Avu52
Behavioral task
behavioral1
Sample
2024-11-17_3880c95f95e58296e8c593c73bfcf8a2_gandcrab_wapomi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-17_3880c95f95e58296e8c593c73bfcf8a2_gandcrab_wapomi.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-11-17_3880c95f95e58296e8c593c73bfcf8a2_gandcrab_wapomi
-
Size
90KB
-
MD5
3880c95f95e58296e8c593c73bfcf8a2
-
SHA1
9e9c03cdce771dc7956ebbb640f9cf2606f66406
-
SHA256
376d5782f32c65daedbb8221fa4bbe17238a8b25a9848cd8b50777fa3fab7b24
-
SHA512
8a193f25bc31c9e7d546072b60b8d51faaeb01204b08f17d16cc324adda88c6859a26b7088cc970dd2d32c1240746acdb139d8e760e7cd1ffe8d830a41f3aaea
-
SSDEEP
1536:q555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:bMSjOnrmBxMqqDL2/mr3IdE8we0Avu52
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
GandCrab payload
-
Gandcrab family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-