General
-
Target
2024-01-09_7cd082d310a64dcf1a5325d1c46f4e7c_karagany_mafia_magniber
-
Size
308KB
-
Sample
240110-gnekgsgcgl
-
MD5
7cd082d310a64dcf1a5325d1c46f4e7c
-
SHA1
f6998c06c68c5e4a48e4fd1a9ad0ee9e39834dbf
-
SHA256
cc569028db7b342db5cd222c80cfbd96526137460b00859917a0e45ca2c2ce61
-
SHA512
d71512ce61560ff7333d816512991d595d81ec1861062cf442b28562fcd35e719305c94e9368982cde15c768d0ee4a2c6c8782d51951bb70503ccd3893db3828
-
SSDEEP
3072:9mBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:9mBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_7cd082d310a64dcf1a5325d1c46f4e7c_karagany_mafia_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-09_7cd082d310a64dcf1a5325d1c46f4e7c_karagany_mafia_magniber.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-09_7cd082d310a64dcf1a5325d1c46f4e7c_karagany_mafia_magniber
-
Size
308KB
-
MD5
7cd082d310a64dcf1a5325d1c46f4e7c
-
SHA1
f6998c06c68c5e4a48e4fd1a9ad0ee9e39834dbf
-
SHA256
cc569028db7b342db5cd222c80cfbd96526137460b00859917a0e45ca2c2ce61
-
SHA512
d71512ce61560ff7333d816512991d595d81ec1861062cf442b28562fcd35e719305c94e9368982cde15c768d0ee4a2c6c8782d51951bb70503ccd3893db3828
-
SSDEEP
3072:9mBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:9mBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-