Behavioral task
behavioral1
Sample
2024-12-30_4730f4d329239521cd00b7e6f4f2983d_gandcrab_mirai.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-30_4730f4d329239521cd00b7e6f4f2983d_gandcrab_mirai.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-30_4730f4d329239521cd00b7e6f4f2983d_gandcrab_mirai
-
Size
496KB
-
MD5
4730f4d329239521cd00b7e6f4f2983d
-
SHA1
51abd6c535e197e90b7aa9954355c84e2523c387
-
SHA256
0f4a7d836e1491908cadb3436f8356de33b139323f3d835fa0cefd460e27f092
-
SHA512
34d0b210d49362c05f42b8255cecf1d9244c5dda111dc6459264f253a03e58f8c9ffef5e0a691673bb3aa215d01d2203ed4e20270f6f87bbf15bb8bf7cbbb68e
-
SSDEEP
6144:6GPTs4COHkM3oNVn163acKhP/xnxFA283PYQpustJfcCIV:5Jk6oNl/xxs/YoVXwV
Malware Config
Signatures
-
Detected LegionLocker ransomware 1 IoCs
Sample contains strings associated with the LegionLocker family.
resource yara_rule sample family_legionlocker -
Legionlocker family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-12-30_4730f4d329239521cd00b7e6f4f2983d_gandcrab_mirai
Files
-
2024-12-30_4730f4d329239521cd00b7e6f4f2983d_gandcrab_mirai.exe windows:0 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 496KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ