General
-
Target
2024-02-01_bb0cd42ba0a0567bb187493b2b879a53_karagany_mafia
-
Size
250KB
-
Sample
240201-ks94qsabhj
-
MD5
bb0cd42ba0a0567bb187493b2b879a53
-
SHA1
5a4c1bfa2b476be133a385b436c1b22b0cecad0b
-
SHA256
5c7409e36402c79406055c33c742ddefa3bbf365fc7a7f9c10cfef932afedbc2
-
SHA512
72bd408c23a0744c3d25cb06322e720ed872e6fe7e2c94e00563c7c9f173412e8ab9a3a9f0fe9ea6e428054fb112d64cbe17d9d1a159dc552db8badcc272388a
-
SSDEEP
6144:j+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:XOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_bb0cd42ba0a0567bb187493b2b879a53_karagany_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_bb0cd42ba0a0567bb187493b2b879a53_karagany_mafia.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-01_bb0cd42ba0a0567bb187493b2b879a53_karagany_mafia
-
Size
250KB
-
MD5
bb0cd42ba0a0567bb187493b2b879a53
-
SHA1
5a4c1bfa2b476be133a385b436c1b22b0cecad0b
-
SHA256
5c7409e36402c79406055c33c742ddefa3bbf365fc7a7f9c10cfef932afedbc2
-
SHA512
72bd408c23a0744c3d25cb06322e720ed872e6fe7e2c94e00563c7c9f173412e8ab9a3a9f0fe9ea6e428054fb112d64cbe17d9d1a159dc552db8badcc272388a
-
SSDEEP
6144:j+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:XOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-