General
-
Target
2024-03-06_7e420fea8591cf0825869ff56e648a2a_karagany_mafia
-
Size
308KB
-
Sample
240306-eabwbsac6y
-
MD5
7e420fea8591cf0825869ff56e648a2a
-
SHA1
db2b0424d95c3f96cf21a2f8274006919a431436
-
SHA256
eee3f2f5e3a1b959053fe853baec0509cf94761bac601b869d0f7ae8bd737cb8
-
SHA512
05bfff89a32abb3907f06003dd3095f3095058339201addad1f5de3b67713a2ed2ed95747b071786a40dba5454ff3d49ff6f9729fee34e99fc9b37cd41319a50
-
SSDEEP
6144:+zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:8DHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-06_7e420fea8591cf0825869ff56e648a2a_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_7e420fea8591cf0825869ff56e648a2a_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-06_7e420fea8591cf0825869ff56e648a2a_karagany_mafia
-
Size
308KB
-
MD5
7e420fea8591cf0825869ff56e648a2a
-
SHA1
db2b0424d95c3f96cf21a2f8274006919a431436
-
SHA256
eee3f2f5e3a1b959053fe853baec0509cf94761bac601b869d0f7ae8bd737cb8
-
SHA512
05bfff89a32abb3907f06003dd3095f3095058339201addad1f5de3b67713a2ed2ed95747b071786a40dba5454ff3d49ff6f9729fee34e99fc9b37cd41319a50
-
SSDEEP
6144:+zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:8DHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-