Behavioral task
behavioral1
Sample
2025-02-16_3b3860bc88bb3aa976416c5369bf717f_gandcrab_mirai.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-16_3b3860bc88bb3aa976416c5369bf717f_gandcrab_mirai.exe
Resource
win10v2004-20250211-en
General
-
Target
2025-02-16_3b3860bc88bb3aa976416c5369bf717f_gandcrab_mirai
-
Size
1.0MB
-
MD5
3b3860bc88bb3aa976416c5369bf717f
-
SHA1
ea366a51a201456ba9f338f0802364e825e42038
-
SHA256
55dc6a17efd54701ff22d790f188921b42d8ec6acc7b29fe8958cf6807d5f4b5
-
SHA512
97dd14030298a42de2534a040b99a318e6765241af979f4712664aed8928847a134b510fdcaab226f657425be1eff954d805407e954d21a81ce15795ad1dbc1f
-
SSDEEP
12288:YiukVHhhJVuZyw+84RQvE2NDC9nlAOelf6hoT9mL6fB9nNStMo61K3q:YiuSHNVuZywxtLOelPOMo61Kq
Malware Config
Signatures
-
Detected LegionLocker ransomware 1 IoCs
Sample contains strings associated with the LegionLocker family.
resource yara_rule sample family_legionlocker -
Legionlocker family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-02-16_3b3860bc88bb3aa976416c5369bf717f_gandcrab_mirai
Files
-
2025-02-16_3b3860bc88bb3aa976416c5369bf717f_gandcrab_mirai.exe windows:0 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ