General
-
Target
2024-02-13_cf1317b31f7d69855fbde94cf1eec418_mafia
-
Size
325KB
-
Sample
240213-kqhlpsfc89
-
MD5
cf1317b31f7d69855fbde94cf1eec418
-
SHA1
285bda4f97c725a0ae681471d018dcd487c95b0f
-
SHA256
30fbe247d5fd79e7009a9b2c5a6a346fe72375ff894d8d9dd11974c93fb4e41a
-
SHA512
3561a5720524d98f085e45affeb5936f7a3ff1d249c5f5c73195513cd1ae3c483cc3a5f3625c95742366770fab56934e48205094e4d1fb950b2cd830c848ef64
-
SSDEEP
6144:h5OGTnncBQmBCjTlOgLA3tjp7OEyXk0Lk3dgvXr:zBTwrBCjTcgLA33aEyUak3dgvb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_cf1317b31f7d69855fbde94cf1eec418_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_cf1317b31f7d69855fbde94cf1eec418_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-13_cf1317b31f7d69855fbde94cf1eec418_mafia
-
Size
325KB
-
MD5
cf1317b31f7d69855fbde94cf1eec418
-
SHA1
285bda4f97c725a0ae681471d018dcd487c95b0f
-
SHA256
30fbe247d5fd79e7009a9b2c5a6a346fe72375ff894d8d9dd11974c93fb4e41a
-
SHA512
3561a5720524d98f085e45affeb5936f7a3ff1d249c5f5c73195513cd1ae3c483cc3a5f3625c95742366770fab56934e48205094e4d1fb950b2cd830c848ef64
-
SSDEEP
6144:h5OGTnncBQmBCjTlOgLA3tjp7OEyXk0Lk3dgvXr:zBTwrBCjTcgLA33aEyUak3dgvb
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-