General
-
Target
2024-02-14_6cbf284eeafc7e78cb291d1eb68b0a4f_karagany_mafia
-
Size
308KB
-
Sample
240214-c7rxpsgc29
-
MD5
6cbf284eeafc7e78cb291d1eb68b0a4f
-
SHA1
2f2357b99835f5f2d262c8169e68ab89557a1cd0
-
SHA256
b886f2dc0ef94ae22ca4560b484da18817a1fadeadde43ef3a25b13bc9f61f6d
-
SHA512
d97fccaa49e0ea6eea953577026b25dcc67bb21a3f7ed5d2b0d297a947e0db58d6605d6ff6acdf6806b9d936b7ba767cb10693dec3737ae2f489f40467bed4f6
-
SSDEEP
6144:yzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:4DHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_6cbf284eeafc7e78cb291d1eb68b0a4f_karagany_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_6cbf284eeafc7e78cb291d1eb68b0a4f_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_6cbf284eeafc7e78cb291d1eb68b0a4f_karagany_mafia
-
Size
308KB
-
MD5
6cbf284eeafc7e78cb291d1eb68b0a4f
-
SHA1
2f2357b99835f5f2d262c8169e68ab89557a1cd0
-
SHA256
b886f2dc0ef94ae22ca4560b484da18817a1fadeadde43ef3a25b13bc9f61f6d
-
SHA512
d97fccaa49e0ea6eea953577026b25dcc67bb21a3f7ed5d2b0d297a947e0db58d6605d6ff6acdf6806b9d936b7ba767cb10693dec3737ae2f489f40467bed4f6
-
SSDEEP
6144:yzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:4DHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-