General
-
Target
2024-11-18_1460fcc4862225f83fb9b0b6c1a8a379_gandcrab_wapomi
-
Size
90KB
-
Sample
241118-cvxx7awbnh
-
MD5
1460fcc4862225f83fb9b0b6c1a8a379
-
SHA1
1300657e5bc2ba5935e16db8fb7d38e9872378c7
-
SHA256
46eb4ffb64dd562b3292a776df28acdaf2d8dd2baf42833716477a15687bcd8f
-
SHA512
1aa4f9d35005a8a5003bf684d084cfd51642d22daefd6eacc5637cdceb2609e226b0b1622a217d87fb3f7b15d4ff11832d5d20acec5087d0c5e898402ee33d85
-
SSDEEP
1536:F555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:CMSjOnrmBxMqqDL2/mr3IdE8we0Avu52
Behavioral task
behavioral1
Sample
2024-11-18_1460fcc4862225f83fb9b0b6c1a8a379_gandcrab_wapomi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-18_1460fcc4862225f83fb9b0b6c1a8a379_gandcrab_wapomi.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-11-18_1460fcc4862225f83fb9b0b6c1a8a379_gandcrab_wapomi
-
Size
90KB
-
MD5
1460fcc4862225f83fb9b0b6c1a8a379
-
SHA1
1300657e5bc2ba5935e16db8fb7d38e9872378c7
-
SHA256
46eb4ffb64dd562b3292a776df28acdaf2d8dd2baf42833716477a15687bcd8f
-
SHA512
1aa4f9d35005a8a5003bf684d084cfd51642d22daefd6eacc5637cdceb2609e226b0b1622a217d87fb3f7b15d4ff11832d5d20acec5087d0c5e898402ee33d85
-
SSDEEP
1536:F555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:CMSjOnrmBxMqqDL2/mr3IdE8we0Avu52
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
GandCrab payload
-
Gandcrab family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-