General
-
Target
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber
-
Size
308KB
-
Sample
240214-jejh7adh84
-
MD5
47acb8211addeb2fda8851a39c338b66
-
SHA1
efbf462e72f3c6b32502dd60d36eacc95cbe2363
-
SHA256
0da378abdfee2338636cb3aa255c49f6c2410cf76fe787203ca4ec7b8a9b527e
-
SHA512
0c1c43c49c3e527f287e05de4bd64117b9114ac742c58d70158bd5f3a49956d11172b95d409605e9fac64681e9e375c9d752aa2393a7a850366b58f3bfe91491
-
SSDEEP
3072:smBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:smBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-02-14_47acb8211addeb2fda8851a39c338b66_karagany_mafia_magniber
-
Size
308KB
-
MD5
47acb8211addeb2fda8851a39c338b66
-
SHA1
efbf462e72f3c6b32502dd60d36eacc95cbe2363
-
SHA256
0da378abdfee2338636cb3aa255c49f6c2410cf76fe787203ca4ec7b8a9b527e
-
SHA512
0c1c43c49c3e527f287e05de4bd64117b9114ac742c58d70158bd5f3a49956d11172b95d409605e9fac64681e9e375c9d752aa2393a7a850366b58f3bfe91491
-
SSDEEP
3072:smBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:smBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-