Advertisement
G0dR4p3

GandCrab_Ransomware_IOC's_14-05-2018

May 14th, 2018
322
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.00 KB | None | 0 0
  1. #GandCrab #Ransomware #Dropper
  2. -------------------------------------
  3. 14-05-2018 IOC's
  4. -------------------------------------
  5. Main object- "malPHP.txt"
  6. sha256 f0a3f5b014b6712339aee33550899699c402c5cf9cc6792e3c5bb63997bda8e6
  7. sha1 b6abc0588d30f4c24a6b599e4e4c60087781a266
  8. md5 ed29aaa57866be2710ed01d576b48831
  9. Dropped executable file
  10. sha256 C:\Users\admin\AppData\Local\Temp\bbud3tzj6.exe e0b7584f713ca7ea379654f1ee638c9161ecd4bf918759236330906465590dbb
  11. sha256 C:\Users\admin\AppData\Roaming\Microsoft\gogkpe.exe 950950bfa5ac44c4c3c2a54659dc918e0a877acc72ab9f5e1152376957ef192a
  12. DNS requests
  13. domain ransomware.bit
  14. domain ns1.wowservers.ru
  15. domain ns2.wowservers.ru
  16. domain ipv4bot.whatismyipaddress.com
  17. domain www.zxytcjj.com
  18. domain www.a-bricks.com
  19. Connections
  20. ip 66.171.248.178
  21. ip 189.75.183.21
  22. ip 89.203.10.56
  23. ip 194.9.94.60
  24. ip 122.10.89.181
  25. HTTP/HTTPS requests
  26. url http://www.zxytcjj.com/update.php
  27. url http://www.a-bricks.com/file_1.php
  28. url http://carder.bit/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement