GandCrab Ransomware | VTI by Score
Try VMRay Analyzer
VTI Information
VTI Score
100 / 100
VTI Database Version 2.6
VTI Rule Match Count 24
VTI Rule Type Default (PE, ...)
Detected Threats
Arrow File System Encrypt content of user files
Encrypt the content of multiple user files. This is an indicator for ransomware.
Arrow OS Modify certificate store
Add a certificate to the local "gdcb-decrypt.txt" by file.
Add a certificate to the local "my" gdcb-decrypt.txt list by file.
Add a certificate to the local "my" certificate list by file.
Add a certificate to the local "my" revocation list by file.
Add a certificate to the local "my" certificate trust list by file.
Arrow Browser Read data related to browser cookies
Read Cookies for "Mozilla Firefox".
Arrow Browser Read data related to saved browser credentials
Read the master key for "Mozilla Firefox".
Arrow Anti Analysis Try to detect virtual machine
Readout system information, commonly used to detect VMs via registry. (Value "Identifier" in key "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0").
Arrow Browser Read data related to browsing history
Read browsing history and related data, such as bookmarks, for "Mozilla Firefox".
Arrow Network Reputation URL lookup
URL "78.155.206.6/curl.php?token=1019" is known as suspicious URL.
Arrow Anti Analysis Dynamic API usage
Resolve above average number of APIs.
Arrow Process Create system object
Create mutex with name "Global\pc_group=WORKGROUP&ransom_id=dce1bb8bd2ca4def".
Create mutex with name "firefox browser".
Arrow Persistence Install system startup script or application
Add ""C:\Users\CIiHmnxMn6Ps\AppData\Roaming\Microsoft\tubcvd.exe"" to windows startup via registry.
Add "c:\users\ciihmnxmn6ps\appdata\roaming\microsoft\windows\start menu\programs\startup\gdcb-decrypt.txt" to windows startup folder.
Arrow Process Create process with hidden window
The process "nslookup gandcrab.bit a.dnspod.com" starts with hidden window.
The process "C:\Windows\system32\wbem\wmic" starts with hidden window.
The process "C:\Windows\system32\wbem\wmic.exe" starts with hidden window.
Arrow Network Perform DNS request
Resolve host name "a.dnspod.com".
Arrow File System Create many files
Create above average number of files.
Arrow Network Check external IP address
Check external IP by asking IP info service at "ipv4bot.whatismyipaddress.com/".
Arrow Network Download data
URL "ipv4bot.whatismyipaddress.com/".
URL "78.155.206.6/curl.php?token=1019".
Arrow Network Connect to HTTP server
URL "ipv4bot.whatismyipaddress.com/".
URL "78.155.206.6/curl.php?token=1019".
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image