General
-
Target
2025-04-10_6c8f5df927d680b7996f5c1a93d84619_elex_gandcrab_rhadamanthys
-
Size
80KB
-
Sample
250410-rsz24atqy3
-
MD5
6c8f5df927d680b7996f5c1a93d84619
-
SHA1
12a635e4c74980b608f5b40e06cb3218e570ae82
-
SHA256
02e8cbc1da24de568f9a5ea4c45f6d7094ec36b34f04cc33ce7ab882a38faa15
-
SHA512
2020280e224e5228932b5f0eb10373e8a9603ee1f8d7482006381bf15c1e35f16f6630265e9facc8854d5cd505c3bb48a3be8bb522a674a66d261d91efe1a9e7
-
SSDEEP
1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rM:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5A
Behavioral task
behavioral1
Sample
2025-04-10_6c8f5df927d680b7996f5c1a93d84619_elex_gandcrab_rhadamanthys.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
2025-04-10_6c8f5df927d680b7996f5c1a93d84619_elex_gandcrab_rhadamanthys
-
Size
80KB
-
MD5
6c8f5df927d680b7996f5c1a93d84619
-
SHA1
12a635e4c74980b608f5b40e06cb3218e570ae82
-
SHA256
02e8cbc1da24de568f9a5ea4c45f6d7094ec36b34f04cc33ce7ab882a38faa15
-
SHA512
2020280e224e5228932b5f0eb10373e8a9603ee1f8d7482006381bf15c1e35f16f6630265e9facc8854d5cd505c3bb48a3be8bb522a674a66d261d91efe1a9e7
-
SSDEEP
1536:455u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rM:aMSjOnrmBTMqqDL2/mr3IdE8we0Avu5A
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-