General
-
Target
2024-01-22_bb26a8b3ea88365c2edf438919300366_karagany_mafia
-
Size
308KB
-
Sample
240122-zg9q6adgb7
-
MD5
bb26a8b3ea88365c2edf438919300366
-
SHA1
b438c23cd571c0db762c162f94b9e2474ef46522
-
SHA256
562b9ad6cdb24d06de0fd54d62b3191da56a256d95bba6080b84ec5498122546
-
SHA512
92f763fb0618e52a0c5d8cafd7127c42d3b7dcee11e7cc6b404f344082580f6f5dd5ade18c98a9200cd5426ae2d168a4353be5f2a23d3fad9e62bcd72dc347ba
-
SSDEEP
6144:1zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:rDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-22_bb26a8b3ea88365c2edf438919300366_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-22_bb26a8b3ea88365c2edf438919300366_karagany_mafia.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-22_bb26a8b3ea88365c2edf438919300366_karagany_mafia
-
Size
308KB
-
MD5
bb26a8b3ea88365c2edf438919300366
-
SHA1
b438c23cd571c0db762c162f94b9e2474ef46522
-
SHA256
562b9ad6cdb24d06de0fd54d62b3191da56a256d95bba6080b84ec5498122546
-
SHA512
92f763fb0618e52a0c5d8cafd7127c42d3b7dcee11e7cc6b404f344082580f6f5dd5ade18c98a9200cd5426ae2d168a4353be5f2a23d3fad9e62bcd72dc347ba
-
SSDEEP
6144:1zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:rDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-