General
-
Target
2024-02-23_7af1e59a9128edd0f4549bc4de89d74d_karagany_mafia_magniber
-
Size
308KB
-
Sample
240223-sm6s5ach2v
-
MD5
7af1e59a9128edd0f4549bc4de89d74d
-
SHA1
7bc87b0936082d7b8e6ffc1c7578f2f861c5a9a4
-
SHA256
c461603f91b95108d8984bdf73b219778eacc00fac56bdf8e0be3b248fcd4047
-
SHA512
fdaa8ed2065bb67e77529044690f66c0607783c560e715b66145e11c38e41774af5e75c46c27598e4eda4f149521d0f58e9270561d7267e3b39ec51a3c6c092b
-
SSDEEP
3072:qmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:qmBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-23_7af1e59a9128edd0f4549bc4de89d74d_karagany_mafia_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-23_7af1e59a9128edd0f4549bc4de89d74d_karagany_mafia_magniber.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-23_7af1e59a9128edd0f4549bc4de89d74d_karagany_mafia_magniber
-
Size
308KB
-
MD5
7af1e59a9128edd0f4549bc4de89d74d
-
SHA1
7bc87b0936082d7b8e6ffc1c7578f2f861c5a9a4
-
SHA256
c461603f91b95108d8984bdf73b219778eacc00fac56bdf8e0be3b248fcd4047
-
SHA512
fdaa8ed2065bb67e77529044690f66c0607783c560e715b66145e11c38e41774af5e75c46c27598e4eda4f149521d0f58e9270561d7267e3b39ec51a3c6c092b
-
SSDEEP
3072:qmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:qmBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-