Advertisement
G0dR4p3

GandCrab Ransomware IOC's 25-04-2018

Apr 25th, 2018
537
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.00 KB | None | 0 0
  1. #Gandcrab #Ransomware #Trojan #Malware
  2.  
  3. Analysis:
  4. https://app.any.run/tasks/a1514f7f-cf2a-4f9e-889a-ea9177d55537
  5.  
  6. Main object- "fattura#87448680672-270620198172_2018_4_24_798144.pdf.js"
  7. sha256 d7603311a426562888ae4327a5da4061e3223de247355d542b0d4a20229a05ec
  8. sha1 fe09aaf885bec68436ed832b1dfdbba84a168417
  9. md5 0a328de6f5e9a70dd5a7bcc407c0c738
  10. Dropped executable file
  11. sha256 C:\Users\admin\AppData\Local\Temp\garageidentityopportunity.exe 191a65f32c603e1543d9414870dab94e3321401ae55ffe854e1a072b37888172
  12. sha256 C:\Users\admin\AppData\Roaming\Microsoft\qoyabf.exe 76cc5b86f38f87ccd6e6d38972f19cb40e076aff1428d94fa1868ec245b7a044
  13. DNS requests
  14. domain ransomware.bit
  15. domain zonealarm.bit
  16. domain ns1.corp-servers.ru
  17. domain ns2.corp-servers.ru
  18. domain ipv4bot.whatismyipaddress.com
  19. domain pythonxl.fun
  20. domain bwyvryyaou.com
  21. Connections
  22. ip 94.249.60.127
  23. ip 89.203.10.56
  24. ip 185.67.45.121
  25. ip 189.75.183.21
  26. ip 66.171.248.178
  27. HTTP/HTTPS requests
  28. url http://ransomware.bit/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement