General
-
Target
13da4b839a8adfac11f42e9cb135a4ecd4ad6c1253d5717cb9685f9bf4b079a4N.exe
-
Size
73KB
-
Sample
250124-cphw3svkb1
-
MD5
f86ab14abe34b5978e50dd191bacb140
-
SHA1
a1461cad37ff3e9d9503aeb70c1066a9c9820eaa
-
SHA256
13da4b839a8adfac11f42e9cb135a4ecd4ad6c1253d5717cb9685f9bf4b079a4
-
SHA512
a77d8b9f086a019861a801c0600071e603789916e4d1410a3ba9117d117287c8df7e4ca27cdfa46f51fdf08531cd2d6866d725ebae1cf90ca7c1c0542f8e03bb
-
SSDEEP
1536:m55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:MMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F
Behavioral task
behavioral1
Sample
13da4b839a8adfac11f42e9cb135a4ecd4ad6c1253d5717cb9685f9bf4b079a4N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13da4b839a8adfac11f42e9cb135a4ecd4ad6c1253d5717cb9685f9bf4b079a4N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
13da4b839a8adfac11f42e9cb135a4ecd4ad6c1253d5717cb9685f9bf4b079a4N.exe
-
Size
73KB
-
MD5
f86ab14abe34b5978e50dd191bacb140
-
SHA1
a1461cad37ff3e9d9503aeb70c1066a9c9820eaa
-
SHA256
13da4b839a8adfac11f42e9cb135a4ecd4ad6c1253d5717cb9685f9bf4b079a4
-
SHA512
a77d8b9f086a019861a801c0600071e603789916e4d1410a3ba9117d117287c8df7e4ca27cdfa46f51fdf08531cd2d6866d725ebae1cf90ca7c1c0542f8e03bb
-
SSDEEP
1536:m55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:MMSjOnrmBTMqqDL2/mr3IdE8we0Avu5F
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-