General
-
Target
2024-11-18_b9c0ee2976d70b2f65f01d6f2bef7219_gandcrab_wapomi
-
Size
90KB
-
Sample
241118-egjvhssqdj
-
MD5
b9c0ee2976d70b2f65f01d6f2bef7219
-
SHA1
ed34ecfd9e73e42e3154f69575ed80c78ae69001
-
SHA256
e26f50050fdfba05ea616d6469f919d154c730a2aaa9f4e2ed643e0c2e1e58c6
-
SHA512
a88c451f81472a8d0d99356fd33cf5c7418fb395498acec054b27c08472917e0c2e2cdeba7d563304cf8c5a215993c9bc1484cd5481c255a2e2e92a74a7c6297
-
SSDEEP
1536:w555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:NMSjOnrmBxMqqDL2/mr3IdE8we0Avu52
Behavioral task
behavioral1
Sample
2024-11-18_b9c0ee2976d70b2f65f01d6f2bef7219_gandcrab_wapomi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-18_b9c0ee2976d70b2f65f01d6f2bef7219_gandcrab_wapomi.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Extracted
bdaejec
ddos.dnsnb8.net
Targets
-
-
Target
2024-11-18_b9c0ee2976d70b2f65f01d6f2bef7219_gandcrab_wapomi
-
Size
90KB
-
MD5
b9c0ee2976d70b2f65f01d6f2bef7219
-
SHA1
ed34ecfd9e73e42e3154f69575ed80c78ae69001
-
SHA256
e26f50050fdfba05ea616d6469f919d154c730a2aaa9f4e2ed643e0c2e1e58c6
-
SHA512
a88c451f81472a8d0d99356fd33cf5c7418fb395498acec054b27c08472917e0c2e2cdeba7d563304cf8c5a215993c9bc1484cd5481c255a2e2e92a74a7c6297
-
SSDEEP
1536:w555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rS:NMSjOnrmBxMqqDL2/mr3IdE8we0Avu52
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
GandCrab payload
-
Gandcrab family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-