General
-
Target
2024-01-18_e1aade8aca96845baee015f22a075502_karagany_mafia
-
Size
308KB
-
Sample
240118-3gegssgbal
-
MD5
e1aade8aca96845baee015f22a075502
-
SHA1
45c4c68fa54604b63928644f6e0d39bd5758dd23
-
SHA256
eeb90704bd9ee76d0988dbe467bcc943e7b5163f9356441a698163ae57f5e953
-
SHA512
440c4119d4d035fc67c6db60b1d533bd03c1138cca554cde24aca712b5f388a0ef03d19306846ebd8b6e1820281b1f35408e3732764089e9b7dd1d6986de9142
-
SSDEEP
6144:YzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:+DHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_e1aade8aca96845baee015f22a075502_karagany_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-18_e1aade8aca96845baee015f22a075502_karagany_mafia.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-18_e1aade8aca96845baee015f22a075502_karagany_mafia
-
Size
308KB
-
MD5
e1aade8aca96845baee015f22a075502
-
SHA1
45c4c68fa54604b63928644f6e0d39bd5758dd23
-
SHA256
eeb90704bd9ee76d0988dbe467bcc943e7b5163f9356441a698163ae57f5e953
-
SHA512
440c4119d4d035fc67c6db60b1d533bd03c1138cca554cde24aca712b5f388a0ef03d19306846ebd8b6e1820281b1f35408e3732764089e9b7dd1d6986de9142
-
SSDEEP
6144:YzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:+DHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-