Behavioral task
behavioral1
Sample
2025-02-16_8eadf8cdcf8a0c55bb10b4bcbc80069b_gandcrab_mirai.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-16_8eadf8cdcf8a0c55bb10b4bcbc80069b_gandcrab_mirai.exe
Resource
win10v2004-20250207-en
General
-
Target
2025-02-16_8eadf8cdcf8a0c55bb10b4bcbc80069b_gandcrab_mirai
-
Size
1.0MB
-
MD5
8eadf8cdcf8a0c55bb10b4bcbc80069b
-
SHA1
e32f8d1957c5b5b0a75737b5fdaf5d8f216dc94b
-
SHA256
93f811e854b52f3fe34aa0c78013da2e5066e95512dd784fe0061a1d90ae5e56
-
SHA512
cf4017a683488c9aa5ee26d704cc6f1ccd09f8fa451a55490a8695b1a293b6048a44d49ba4209838417a7eb5bb635999d8e5a3719724863b241bd6a84c0a27d9
-
SSDEEP
12288:viukVHhhJVuZyw+83azvE2NDC9nRsEOekf1hoT9mL6fB9nNStIA61K3i:viuSHNVuZywxcasEOeDPOIA61Ki
Malware Config
Signatures
-
Detected LegionLocker ransomware 1 IoCs
Sample contains strings associated with the LegionLocker family.
resource yara_rule sample family_legionlocker -
Legionlocker family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-02-16_8eadf8cdcf8a0c55bb10b4bcbc80069b_gandcrab_mirai
Files
-
2025-02-16_8eadf8cdcf8a0c55bb10b4bcbc80069b_gandcrab_mirai.exe windows:0 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ