analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

GandCrab.bin.zip

Full analysis: https://app.any.run/tasks/639bb8ec-034e-4144-b98b-d85c0e5ce030
Verdict: Malicious activity
Threats:

GandCrab is probably one of the most famous Ransomware. A Ransomware is a malware that asks the victim to pay money in order to restore access to encrypted files. If the user does not cooperate the files are forever lost.

Analysis date: January 22, 2019, 23:01:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
ransomware
gandcrab
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

8435576AA18BCD2FA9073B2D1EFA75D4

SHA1:

DBD11020200C5A462065522F2C1099B81F4BCA48

SHA256:

2A8AF2F9DA1509AB2FC9AA9A5E9AC9193FA87499790EBCC3380370C57BF82A88

SSDEEP:

1536:NNhnveWsDKsXwIDcSCJox5FGGwWe4YJ1nk3IaRAYw9KeaLaIY7tUYSHHv7gjSJvS:NNhnTsT0OKWe4YJ1kxANfaL3QjSHk2S

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • GandCrab.exe (PID: 3496)
    • Changes the autorun value in the registry

      • GandCrab.exe (PID: 3496)
    • GANDCRAB was detected

      • nslookup.exe (PID: 2372)
      • nslookup.exe (PID: 3916)
    • GandCrab detected

      • GandCrab.exe (PID: 3496)
  • SUSPICIOUS

    • Creates files in the user directory

      • GandCrab.exe (PID: 3496)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2840)
      • GandCrab.exe (PID: 3496)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2018:04:18 14:09:00
ZipCRC: 0x984400f5
ZipCompressedSize: 84379
ZipUncompressedSize: 127488
ZipFileName: GandCrab.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #GANDCRAB gandcrab.exe #GANDCRAB nslookup.exe #GANDCRAB nslookup.exe

Process information

PID
CMD
Path
Indicators
Parent process
2840"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\GandCrab.bin.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
3496"C:\Users\admin\Desktop\GandCrab.exe" C:\Users\admin\Desktop\GandCrab.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
11.0.0.1
3916nslookup gandcrab.bit a.dnspod.comC:\Windows\system32\nslookup.exe
GandCrab.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
nslookup
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2372nslookup gandcrab.bit a.dnspod.comC:\Windows\system32\nslookup.exe
GandCrab.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
nslookup
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
484
Read events
445
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3496GandCrab.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\ipv4bot_whatismyipaddress_com[1].htm
MD5:
SHA256:
3496GandCrab.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302019708-1500728564-335382590-1000\0f5007522459c86e95ffcc62f32308f1_90059c37-1320-41a4-b58d-2b75a9850d2fbinary
MD5:1BB36BC4C75A36BC003DEF4C3AD21D3A
SHA256:4981C6C172B9CF312619A4CC5A7E13C86495EF882670D2E80F6C927F86D78951
2840WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2840.9756\GandCrab.exeexecutable
MD5:A635D6A35C2FC054042B6868EF52A0C3
SHA256:643F8043C0B0F89CEDBFC3177AB7CFE99A8E2C7FE16691F3D54FB18BC14B8F45
3496GandCrab.exeC:\Users\admin\AppData\Roaming\Microsoft\vmubxd.exeexecutable
MD5:A635D6A35C2FC054042B6868EF52A0C3
SHA256:643F8043C0B0F89CEDBFC3177AB7CFE99A8E2C7FE16691F3D54FB18BC14B8F45
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
11
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3496
GandCrab.exe
GET
200
66.171.248.178:80
http://ipv4bot.whatismyipaddress.com/
US
text
11 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3496
GandCrab.exe
66.171.248.178:80
ipv4bot.whatismyipaddress.com
Alchemy Communications, Inc.
US
malicious
3916
nslookup.exe
58.251.121.110:53
a.dnspod.com
China Unicom Shenzen network
CN
malicious
2372
nslookup.exe
58.251.121.110:53
a.dnspod.com
China Unicom Shenzen network
CN
malicious

DNS requests

Domain
IP
Reputation
ipv4bot.whatismyipaddress.com
  • 66.171.248.178
shared
a.dnspod.com
  • 58.251.121.110
  • 101.226.79.205
shared
gandcrab.bit
malicious

Threats

PID
Process
Class
Message
3496
GandCrab.exe
Misc activity
SUSPICIOUS [PTsecurity] IP Check (whatismyipaddress)
3916
nslookup.exe
A Network Trojan was detected
ET TROJAN Observed GandCrab Domain (gandcrab .bit)
3916
nslookup.exe
Potentially Bad Traffic
ET CURRENT_EVENTS DNS Query Domain .bit
3916
nslookup.exe
A Network Trojan was detected
ET TROJAN Observed GandCrab Domain (gandcrab .bit)
3916
nslookup.exe
Potentially Bad Traffic
ET CURRENT_EVENTS DNS Query Domain .bit
3916
nslookup.exe
A Network Trojan was detected
ET TROJAN Observed GandCrab Domain (gandcrab .bit)
3916
nslookup.exe
Potentially Bad Traffic
ET CURRENT_EVENTS DNS Query Domain .bit
3916
nslookup.exe
A Network Trojan was detected
ET TROJAN Observed GandCrab Domain (gandcrab .bit)
3916
nslookup.exe
Potentially Bad Traffic
ET CURRENT_EVENTS DNS Query Domain .bit
2372
nslookup.exe
A Network Trojan was detected
ET TROJAN Observed GandCrab Domain (gandcrab .bit)
1 ETPRO signatures available at the full report
No debug info