General
-
Target
2024-02-14_05d9d6f6233d87249dd5a968b7aaa594_mafia
-
Size
351KB
-
Sample
240214-lbz3waef5v
-
MD5
05d9d6f6233d87249dd5a968b7aaa594
-
SHA1
c24945a2e69de62d7e5c59e4d1d58e1c54c68633
-
SHA256
9415d93c01505acd9360879d155cf6c8e6cd3d8035a43c4bb1c2347c19d10e2a
-
SHA512
074b2cbb19ec005d2474018c70e995ae266197564c6e27888cf91bdc945306062d6168cd439b04bf0770d529c07d3417d5145f096fa96328e6fa6aa5b0fb2415
-
SSDEEP
3072:jpNMs+Kr1wbWGjl0xjsNNeVKBNVBxKT46xl+wndfIQQOaC3QBn7/hsb2BhGZ1/Nb:jpNMsLWEjsXjBATRpuuwnGD/Nj6a
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_05d9d6f6233d87249dd5a968b7aaa594_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-14_05d9d6f6233d87249dd5a968b7aaa594_mafia.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-02-14_05d9d6f6233d87249dd5a968b7aaa594_mafia
-
Size
351KB
-
MD5
05d9d6f6233d87249dd5a968b7aaa594
-
SHA1
c24945a2e69de62d7e5c59e4d1d58e1c54c68633
-
SHA256
9415d93c01505acd9360879d155cf6c8e6cd3d8035a43c4bb1c2347c19d10e2a
-
SHA512
074b2cbb19ec005d2474018c70e995ae266197564c6e27888cf91bdc945306062d6168cd439b04bf0770d529c07d3417d5145f096fa96328e6fa6aa5b0fb2415
-
SSDEEP
3072:jpNMs+Kr1wbWGjl0xjsNNeVKBNVBxKT46xl+wndfIQQOaC3QBn7/hsb2BhGZ1/Nb:jpNMsLWEjsXjBATRpuuwnGD/Nj6a
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-