General
-
Target
2024-01-22_99f16d5a11c7e03d745379c37d9c6819_karagany_mafia
-
Size
308KB
-
Sample
240122-t4xgfsaehj
-
MD5
99f16d5a11c7e03d745379c37d9c6819
-
SHA1
83a691755e0fdd297a2b39f6966a13dfa7fa278e
-
SHA256
571b005db6399dd91663da14b7bdc6a6845bbe42eb7e88fd93e0350f4187fd08
-
SHA512
406d8d9fbd9fa048595f4be94b22449a454b6bc99d8b716bc1f7b8de71a415996dd6d51979ff6adc56ea81d66ae8a9314ebf28814989d49d6929d437b557ce01
-
SSDEEP
6144:WzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:UDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-22_99f16d5a11c7e03d745379c37d9c6819_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-22_99f16d5a11c7e03d745379c37d9c6819_karagany_mafia.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-22_99f16d5a11c7e03d745379c37d9c6819_karagany_mafia
-
Size
308KB
-
MD5
99f16d5a11c7e03d745379c37d9c6819
-
SHA1
83a691755e0fdd297a2b39f6966a13dfa7fa278e
-
SHA256
571b005db6399dd91663da14b7bdc6a6845bbe42eb7e88fd93e0350f4187fd08
-
SHA512
406d8d9fbd9fa048595f4be94b22449a454b6bc99d8b716bc1f7b8de71a415996dd6d51979ff6adc56ea81d66ae8a9314ebf28814989d49d6929d437b557ce01
-
SSDEEP
6144:WzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:UDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-