General
-
Target
2024-02-20_6e6fba4a837c3f35b98a579d3f978053_karagany_mafia_magniber
-
Size
308KB
-
Sample
240220-r2laasac96
-
MD5
6e6fba4a837c3f35b98a579d3f978053
-
SHA1
73baadcd90b0d81d2126aea0642cc45c1e63f32c
-
SHA256
3671d9d2e8c40a9718a4016977626d8406532d254a09b9500373336d210022d1
-
SHA512
d09c2f6c45872fd37390d12923538477ba9bf10a2b9b64d876a1508a335d610b773d8386ae3fc4a9c81eed42f714aab7ae2efe4bd5d6162dfd58b61b626c2b2e
-
SSDEEP
3072:VmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:VmBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_6e6fba4a837c3f35b98a579d3f978053_karagany_mafia_magniber.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_6e6fba4a837c3f35b98a579d3f978053_karagany_mafia_magniber.exe
Resource
win10v2004-20240220-en
Malware Config
Targets
-
-
Target
2024-02-20_6e6fba4a837c3f35b98a579d3f978053_karagany_mafia_magniber
-
Size
308KB
-
MD5
6e6fba4a837c3f35b98a579d3f978053
-
SHA1
73baadcd90b0d81d2126aea0642cc45c1e63f32c
-
SHA256
3671d9d2e8c40a9718a4016977626d8406532d254a09b9500373336d210022d1
-
SHA512
d09c2f6c45872fd37390d12923538477ba9bf10a2b9b64d876a1508a335d610b773d8386ae3fc4a9c81eed42f714aab7ae2efe4bd5d6162dfd58b61b626c2b2e
-
SSDEEP
3072:VmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:VmBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-