General
-
Target
2024-01-25_50dc9bfacf4f54083cf59be1358111e9_karagany_mafia
-
Size
308KB
-
Sample
240125-jathlabfcm
-
MD5
50dc9bfacf4f54083cf59be1358111e9
-
SHA1
1d7022a4d70d9022978aa694964bcab383a0b418
-
SHA256
93a7af019283a17963db5492dbf4a4e5f6e3f6546cb5f3b41feedf286f061ccc
-
SHA512
be3d8caded59d0f7e581a9733deccf4f06eb2ca799c2d5125c189f582ce519d7d1411408fc934a5cc03bfcdffdfda135217ecf6e102b3f2f3c08c3de55aeda60
-
SSDEEP
6144:mzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:kDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_50dc9bfacf4f54083cf59be1358111e9_karagany_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-25_50dc9bfacf4f54083cf59be1358111e9_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-25_50dc9bfacf4f54083cf59be1358111e9_karagany_mafia
-
Size
308KB
-
MD5
50dc9bfacf4f54083cf59be1358111e9
-
SHA1
1d7022a4d70d9022978aa694964bcab383a0b418
-
SHA256
93a7af019283a17963db5492dbf4a4e5f6e3f6546cb5f3b41feedf286f061ccc
-
SHA512
be3d8caded59d0f7e581a9733deccf4f06eb2ca799c2d5125c189f582ce519d7d1411408fc934a5cc03bfcdffdfda135217ecf6e102b3f2f3c08c3de55aeda60
-
SSDEEP
6144:mzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:kDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-