General
-
Target
2024-02-25_97567b4babec5dd9633274e2c7fcf380_karagany_mafia_magniber
-
Size
308KB
-
Sample
240225-gkbpesdb55
-
MD5
97567b4babec5dd9633274e2c7fcf380
-
SHA1
8ccaa2ff209f37703ea5a451435c4f2f2a08c73c
-
SHA256
94cf73dd95f0b3810ef1ebbdf6c83f8d00d982244c63337e414f7719e3efa852
-
SHA512
6753e4eec8585d4a4e7685512232279fc9c61af8dd763a9fe839333329f3cbc055bd716809b865e7ad1a570789e6d5ab9124151c83275b8d688001f7f1d746e7
-
SSDEEP
3072:imBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:imBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_97567b4babec5dd9633274e2c7fcf380_karagany_mafia_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_97567b4babec5dd9633274e2c7fcf380_karagany_mafia_magniber.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-25_97567b4babec5dd9633274e2c7fcf380_karagany_mafia_magniber
-
Size
308KB
-
MD5
97567b4babec5dd9633274e2c7fcf380
-
SHA1
8ccaa2ff209f37703ea5a451435c4f2f2a08c73c
-
SHA256
94cf73dd95f0b3810ef1ebbdf6c83f8d00d982244c63337e414f7719e3efa852
-
SHA512
6753e4eec8585d4a4e7685512232279fc9c61af8dd763a9fe839333329f3cbc055bd716809b865e7ad1a570789e6d5ab9124151c83275b8d688001f7f1d746e7
-
SSDEEP
3072:imBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:imBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-