General
-
Target
2024-01-27_3c31376b47a34e6423bfde62fc69a6d3_karagany_mafia
-
Size
308KB
-
Sample
240127-e2417aefdr
-
MD5
3c31376b47a34e6423bfde62fc69a6d3
-
SHA1
854af88b11e4d8d32c5b1649e6c7b6a87d5fe5ac
-
SHA256
328232a48e516b9b82449c2a4e8c9a95584d7d2e30ae4642cf61ed44570c324f
-
SHA512
0ffe1ec05b8d14b206af2cb897250a65843bd1b9b4cc86c59ca83c164781074082ac12a5f0fda75dd78a2ac2313d294b9146c49ee17bc379bf1a0a1d8f5452b9
-
SSDEEP
6144:fzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:1DHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_3c31376b47a34e6423bfde62fc69a6d3_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_3c31376b47a34e6423bfde62fc69a6d3_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-01-27_3c31376b47a34e6423bfde62fc69a6d3_karagany_mafia
-
Size
308KB
-
MD5
3c31376b47a34e6423bfde62fc69a6d3
-
SHA1
854af88b11e4d8d32c5b1649e6c7b6a87d5fe5ac
-
SHA256
328232a48e516b9b82449c2a4e8c9a95584d7d2e30ae4642cf61ed44570c324f
-
SHA512
0ffe1ec05b8d14b206af2cb897250a65843bd1b9b4cc86c59ca83c164781074082ac12a5f0fda75dd78a2ac2313d294b9146c49ee17bc379bf1a0a1d8f5452b9
-
SSDEEP
6144:fzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:1DHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-