We are hiring! Windows Kernel Developer (Remote), apply here!
flash

BUgAyPXboK.exe

Status: finished
Submission Time: 2022-08-31 23:36:11 +02:00
Malicious
Ransomware
Trojan
Evader
Gandcrab

Comments

Tags

  • exe
  • GandCrab

Details

  • Analysis ID:
    694553
  • API (Web) ID:
    1062026
  • Analysis Started:
    2022-08-31 23:42:21 +02:00
  • Analysis Finished:
    2022-08-31 23:52:00 +02:00
  • MD5:
    dde91b6947d2b726e5bb8f5852cecb76
  • SHA1:
    7d2467c4e65238599c5fd05641c628fb4252c7ca
  • SHA256:
    eae8d675873bd846302263fdca95db805b560d3406ec964f76b2d4123f78b59a
  • Technologies:
Full Report Management Report IOC Report Engine Info Verdict Score Reports

malicious

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
62/70

malicious
30/35

malicious
31/31

malicious

malicious

Domains

Name IP Detection
emsisoft.bit
0.0.0.0
nomoreransom.bit
0.0.0.0
gandcrab.bit
0.0.0.0
Click to see the 3 hidden entries
dns1.soprodns.ru
0.0.0.0
ipv4bot.whatismyipaddress.com
0.0.0.0
8.8.8.8.in-addr.arpa
0.0.0.0

URLs

Name Detection
http://gdcbghvjyqy7jclk.onion.casa/e644d32fec6144de
http://gdcbghvjyqy7jclk.onion.top/e644d32fec6144de
http://gdcbghvjyqy7jclk.onion/e644d32fec6144de
Click to see the 4 hidden entries
https://www.torproject.org/
http://gdcbghvjyqy7jclk.onion.guide/e644d32fec6144de
http://gdcbghvjyqy7jclk.onion.plus/e644d32fec6144de
http://gdcbghvjyqy7jclk.onion.rip/e644d32fec6144de

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\ykbxzh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\21c8026919fd094ab07ec3c180a9f210_d06ed635-68f6-4e9a-955c-4899f5f57b9a
data
#