General
-
Target
2024010674c46e8f34cdc2c658b8e09873a6b28ekaraganymafia.exe
-
Size
308KB
-
Sample
240107-yft4mschdk
-
MD5
74c46e8f34cdc2c658b8e09873a6b28e
-
SHA1
c4d24b288f7c759d86ac3ea7c73a449e3230304a
-
SHA256
ebd715b122338a2b1009be158bc9d9fadb54779ead2a17b7ec7664744381c4d6
-
SHA512
1f2106ecd473edf177f7bbdc3e1e6080a078e927ab8d0a64d6437baf8a7f300c909c0d6b115496b0de90ac63c7af269140ee0b066671c37801349305c683a71a
-
SSDEEP
6144:5zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:HDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024010674c46e8f34cdc2c658b8e09873a6b28ekaraganymafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024010674c46e8f34cdc2c658b8e09873a6b28ekaraganymafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024010674c46e8f34cdc2c658b8e09873a6b28ekaraganymafia.exe
-
Size
308KB
-
MD5
74c46e8f34cdc2c658b8e09873a6b28e
-
SHA1
c4d24b288f7c759d86ac3ea7c73a449e3230304a
-
SHA256
ebd715b122338a2b1009be158bc9d9fadb54779ead2a17b7ec7664744381c4d6
-
SHA512
1f2106ecd473edf177f7bbdc3e1e6080a078e927ab8d0a64d6437baf8a7f300c909c0d6b115496b0de90ac63c7af269140ee0b066671c37801349305c683a71a
-
SSDEEP
6144:5zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:HDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-