General
-
Target
2024-02-29_4912d39391f0faefd25e09b58c241a62_karagany_mafia
-
Size
308KB
-
Sample
240229-bybnpaad99
-
MD5
4912d39391f0faefd25e09b58c241a62
-
SHA1
b825fd8e6f183279dd40c1a9e836d948eb9a7ec3
-
SHA256
0df43e7bf350eb1d0d8c082c2f487652c6e4a1db3be079af37e2154cb0a64d5f
-
SHA512
d711597bb23646132ae81452aba670a5f98bb27fb723ab3b428189705acbb121a9bad26d96a66d940f8f376f70571d2615cd5ddca2f9fe00fce2827148b4ff6f
-
SSDEEP
6144:QzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:2DHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_4912d39391f0faefd25e09b58c241a62_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_4912d39391f0faefd25e09b58c241a62_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-29_4912d39391f0faefd25e09b58c241a62_karagany_mafia
-
Size
308KB
-
MD5
4912d39391f0faefd25e09b58c241a62
-
SHA1
b825fd8e6f183279dd40c1a9e836d948eb9a7ec3
-
SHA256
0df43e7bf350eb1d0d8c082c2f487652c6e4a1db3be079af37e2154cb0a64d5f
-
SHA512
d711597bb23646132ae81452aba670a5f98bb27fb723ab3b428189705acbb121a9bad26d96a66d940f8f376f70571d2615cd5ddca2f9fe00fce2827148b4ff6f
-
SSDEEP
6144:QzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:2DHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-