_ReflectiveLoader@0
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
2025-01-27_283c25b50f3ab32dbe4924d20bd07a10_gandcrab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-27_283c25b50f3ab32dbe4924d20bd07a10_gandcrab.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-27_283c25b50f3ab32dbe4924d20bd07a10_gandcrab
-
Size
97KB
-
MD5
283c25b50f3ab32dbe4924d20bd07a10
-
SHA1
5e61291c60bcd08a9c3ea6b4c9e3c26a7df28efe
-
SHA256
7c47e47ef14a3a9e9fd1f66ae83c37923859f7ce32f450cbc42853fc5d7e4705
-
SHA512
63c7c2d34bd32c81419d11b839a52358bade73bad715b34c043fad345bb1d997669c4365754275270a704fdb37d627b9b9c7b819437703bfe0fcf358e262b3a3
-
SSDEEP
1536:eZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAEMqqU+2bbbAV2/S2LNmHkD:oBounVyFHFMqqDL2/LgHkc2
Malware Config
Signatures
-
GandCrab payload 1 IoCs
resource yara_rule sample family_gandcrab -
Gandcrab family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-27_283c25b50f3ab32dbe4924d20bd07a10_gandcrab
Files
-
2025-01-27_283c25b50f3ab32dbe4924d20bd07a10_gandcrab.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Exports
Exports
Sections
UPX0 Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE