General
-
Target
2024-01-06_54c420f688bb75af1cfbf2b2529cfbc9_karagany_mafia
-
Size
265KB
-
Sample
240107-pbr9taedd3
-
MD5
54c420f688bb75af1cfbf2b2529cfbc9
-
SHA1
fb1a4df09c25eaa45a98a2a14f769c330110ea90
-
SHA256
8eba0fee81a8b4069d51c688a4ff8cb3ebe49cdff750cfb802202f1ff1c53747
-
SHA512
176b6f113d3d0d8ca510c88d6281bc43a6cf161e9acfe701d9ee2ebede7537a26346dff6e90c2d56df56481cf6e19090160f0bd7bb461d165f76c2896948185e
-
SSDEEP
3072:uv5tt9cXgoEJk/N77w1ixVJgLzhUkNp2fAhz1WLNoXE1e3GcCFK/ksMRRpwzvjDo:uvSgnk/NgSJqzhUU2fa1WKXIOTzjELEG
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_54c420f688bb75af1cfbf2b2529cfbc9_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_54c420f688bb75af1cfbf2b2529cfbc9_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-06_54c420f688bb75af1cfbf2b2529cfbc9_karagany_mafia
-
Size
265KB
-
MD5
54c420f688bb75af1cfbf2b2529cfbc9
-
SHA1
fb1a4df09c25eaa45a98a2a14f769c330110ea90
-
SHA256
8eba0fee81a8b4069d51c688a4ff8cb3ebe49cdff750cfb802202f1ff1c53747
-
SHA512
176b6f113d3d0d8ca510c88d6281bc43a6cf161e9acfe701d9ee2ebede7537a26346dff6e90c2d56df56481cf6e19090160f0bd7bb461d165f76c2896948185e
-
SSDEEP
3072:uv5tt9cXgoEJk/N77w1ixVJgLzhUkNp2fAhz1WLNoXE1e3GcCFK/ksMRRpwzvjDo:uvSgnk/NgSJqzhUU2fa1WKXIOTzjELEG
Score10/10-
GandCrab payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-