General
-
Target
2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia
-
Size
250KB
-
Sample
240105-gfyy6adee7
-
MD5
83038ce0fd442418738ea54f717d9971
-
SHA1
5ef135c6b72aeaf798fe2574302b224eeb6f9ed6
-
SHA256
daeae69e322553e048c1a885c144d9d1af3d15b8184ca7a12b5dcb2de04ab7cc
-
SHA512
eec8f42ddce66ff310550b0800b3eeeb50380a7359ef654808052224185c7f99a84bed8347ca73b51900f9ab2f9406a4e46c502568bdb02b920cb1cd5e7a6024
-
SSDEEP
6144:B+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:hOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-01_83038ce0fd442418738ea54f717d9971_karagany_mafia
-
Size
250KB
-
MD5
83038ce0fd442418738ea54f717d9971
-
SHA1
5ef135c6b72aeaf798fe2574302b224eeb6f9ed6
-
SHA256
daeae69e322553e048c1a885c144d9d1af3d15b8184ca7a12b5dcb2de04ab7cc
-
SHA512
eec8f42ddce66ff310550b0800b3eeeb50380a7359ef654808052224185c7f99a84bed8347ca73b51900f9ab2f9406a4e46c502568bdb02b920cb1cd5e7a6024
-
SSDEEP
6144:B+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:hOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-