General
-
Target
2024-02-29_40fa32b6a4bf2f6b68da9a2a01352eac_karagany_mafia_magniber
-
Size
308KB
-
Sample
240229-fc3bqsde61
-
MD5
40fa32b6a4bf2f6b68da9a2a01352eac
-
SHA1
51c7257f37659e57235721f25739e43f21cee33b
-
SHA256
c23c7a0e3958eb5563fc24d27b400a496296fea5cc58cca08253b14d655873e7
-
SHA512
cc337f3c8effd33205f0b71e42529918c229137eda9f62a456ab85763dd70f490816cb9a46d34794122a50362e21edf3feae07cc236d2b92d16c0215c96f7aff
-
SSDEEP
3072:kmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:kmBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_40fa32b6a4bf2f6b68da9a2a01352eac_karagany_mafia_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-29_40fa32b6a4bf2f6b68da9a2a01352eac_karagany_mafia_magniber.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-02-29_40fa32b6a4bf2f6b68da9a2a01352eac_karagany_mafia_magniber
-
Size
308KB
-
MD5
40fa32b6a4bf2f6b68da9a2a01352eac
-
SHA1
51c7257f37659e57235721f25739e43f21cee33b
-
SHA256
c23c7a0e3958eb5563fc24d27b400a496296fea5cc58cca08253b14d655873e7
-
SHA512
cc337f3c8effd33205f0b71e42529918c229137eda9f62a456ab85763dd70f490816cb9a46d34794122a50362e21edf3feae07cc236d2b92d16c0215c96f7aff
-
SSDEEP
3072:kmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:kmBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-