General
-
Target
2024-02-22_ef7f2efc3c94577229502b6e401f765f_karagany_mafia
-
Size
308KB
-
Sample
240222-hq8f1sdg9y
-
MD5
ef7f2efc3c94577229502b6e401f765f
-
SHA1
884bbabda568796cc44fc69c4f2375b34370c345
-
SHA256
d476fbc5b5d175ccc93689493453eca5ba4a46f6412c9d4c73501f195f4b4706
-
SHA512
974e1741e8d2848797ff1e995e8b58741b0b5a82a9b236216ed001216ba4937efb7119752b9116b7e961ea787713be8477b63a52a3f96242bcd2e423f7a3d613
-
SSDEEP
6144:gzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:GDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-22_ef7f2efc3c94577229502b6e401f765f_karagany_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-02-22_ef7f2efc3c94577229502b6e401f765f_karagany_mafia.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-22_ef7f2efc3c94577229502b6e401f765f_karagany_mafia
-
Size
308KB
-
MD5
ef7f2efc3c94577229502b6e401f765f
-
SHA1
884bbabda568796cc44fc69c4f2375b34370c345
-
SHA256
d476fbc5b5d175ccc93689493453eca5ba4a46f6412c9d4c73501f195f4b4706
-
SHA512
974e1741e8d2848797ff1e995e8b58741b0b5a82a9b236216ed001216ba4937efb7119752b9116b7e961ea787713be8477b63a52a3f96242bcd2e423f7a3d613
-
SSDEEP
6144:gzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:GDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-