Gandcrab - A deep dive into the Unpacking process
This article is a technical analysis of the unpacking routine of a ransomware sample. This sample was given in a school exercise - NOT PUBLIC.
| SHA256 | 643f8043c0b0f89cedbfc3177ab7cfe99a8e2c7fe16691f3d54fb18bc14b8f45 |
|---|---|
| Filename | malware.exe |
| Popular Threat Label | trojan.gandcrab/jorik |
To prevent my teacher’s TP from becoming public, feel free to contact me on Discord(r3d_malz) to get the writeup (I’ll check that you’re not from my school :) ).
This post is licensed under CC BY 4.0 by the author.
