General
-
Target
2024-01-27_e2c238e6defbd7782db97f03b43e2852_karagany_mafia
-
Size
250KB
-
Sample
240127-t4rafafhc7
-
MD5
e2c238e6defbd7782db97f03b43e2852
-
SHA1
e291a0f3da56deeead48d23e5d481dcf59e81c66
-
SHA256
1fb07a3727d2da95f6ff0ce73bd1960bf5beda20b2dac922c6a1c42c2f4e5c05
-
SHA512
04d2413dcffecc3cafe8a58aec2849c52d34e6866c61eede4c5fadbbfef5ef668fb6b96c47e688e3bb22e189109655c30add257ec7cd1b8d6d05cfffc70f5c6c
-
SSDEEP
3072:S/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:S/y20Gj0r+EBFrkvlU3RvIUDOIN
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_e2c238e6defbd7782db97f03b43e2852_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_e2c238e6defbd7782db97f03b43e2852_karagany_mafia.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-27_e2c238e6defbd7782db97f03b43e2852_karagany_mafia
-
Size
250KB
-
MD5
e2c238e6defbd7782db97f03b43e2852
-
SHA1
e291a0f3da56deeead48d23e5d481dcf59e81c66
-
SHA256
1fb07a3727d2da95f6ff0ce73bd1960bf5beda20b2dac922c6a1c42c2f4e5c05
-
SHA512
04d2413dcffecc3cafe8a58aec2849c52d34e6866c61eede4c5fadbbfef5ef668fb6b96c47e688e3bb22e189109655c30add257ec7cd1b8d6d05cfffc70f5c6c
-
SSDEEP
3072:S/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:S/y20Gj0r+EBFrkvlU3RvIUDOIN
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-