General
-
Target
2024-03-08_6320eeabe789a548b977ed34b7131bcd_karagany_mafia
-
Size
308KB
-
Sample
240308-qtexwagb68
-
MD5
6320eeabe789a548b977ed34b7131bcd
-
SHA1
ea167d863b666b9110113225271fcf8abe9b61c2
-
SHA256
f31da7e559a3002efcc211b72597012556d36caf4b9fbb3ae10fd07ca7dff695
-
SHA512
48f3291d1cfe843723d4558241c8266bcb114c6560af51b40dac966d3038612bc5f583cc8bd36afb67dd10c61bb32c9801327dd3adb6c992d19cf893b2a59539
-
SSDEEP
6144:3zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:NDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-08_6320eeabe789a548b977ed34b7131bcd_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-08_6320eeabe789a548b977ed34b7131bcd_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-08_6320eeabe789a548b977ed34b7131bcd_karagany_mafia
-
Size
308KB
-
MD5
6320eeabe789a548b977ed34b7131bcd
-
SHA1
ea167d863b666b9110113225271fcf8abe9b61c2
-
SHA256
f31da7e559a3002efcc211b72597012556d36caf4b9fbb3ae10fd07ca7dff695
-
SHA512
48f3291d1cfe843723d4558241c8266bcb114c6560af51b40dac966d3038612bc5f583cc8bd36afb67dd10c61bb32c9801327dd3adb6c992d19cf893b2a59539
-
SSDEEP
6144:3zL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:NDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-