General
-
Target
2024-02-28_b445e6621241070301a400ad9e0b8018_karagany_mafia
-
Size
250KB
-
Sample
240228-f3encscc28
-
MD5
b445e6621241070301a400ad9e0b8018
-
SHA1
f8efc3b1b9701d0019975e52ca3644788ff5bde4
-
SHA256
5e3a89e9fc52739a8595ce6c94219fedb3be69ee460cc82a010d46237dfa33b8
-
SHA512
3de41a59ccc40313d20bcb7de4f8b5c198e28494cbc626a0003c18a66226beda8e905bafbe5b00e5ce8eedb4995bafc96cab62744de660d6733b4e5ce21d2b00
-
SSDEEP
3072:O/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:O/y20Gj0r+EBFrkvlU3RvIUDOIN
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-28_b445e6621241070301a400ad9e0b8018_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-28_b445e6621241070301a400ad9e0b8018_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-28_b445e6621241070301a400ad9e0b8018_karagany_mafia
-
Size
250KB
-
MD5
b445e6621241070301a400ad9e0b8018
-
SHA1
f8efc3b1b9701d0019975e52ca3644788ff5bde4
-
SHA256
5e3a89e9fc52739a8595ce6c94219fedb3be69ee460cc82a010d46237dfa33b8
-
SHA512
3de41a59ccc40313d20bcb7de4f8b5c198e28494cbc626a0003c18a66226beda8e905bafbe5b00e5ce8eedb4995bafc96cab62744de660d6733b4e5ce21d2b00
-
SSDEEP
3072:O/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:O/y20Gj0r+EBFrkvlU3RvIUDOIN
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-