General
-
Target
2024-03-18_a0c56feb29065f3a534b6f60c3eb5970_karagany_mafia
-
Size
250KB
-
Sample
240318-mskvyseg94
-
MD5
a0c56feb29065f3a534b6f60c3eb5970
-
SHA1
04b0a88fa72e963aa4537731099bcaf3302a17fa
-
SHA256
71a754b5f425109142db9aa38c370c5bc7550d4a91ea4b314751337256f5921c
-
SHA512
446be8384cb94c1d1a65194ce0183d12aa722af48cbc3860b1469333ae432011db1a24d09ef45abdcb429c303f6c570d63ebbe502484ee8d62ffa17d835529e1
-
SSDEEP
3072:W/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:W/y20Gj0r+EBFrkvlU3RvIUDOIN
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-18_a0c56feb29065f3a534b6f60c3eb5970_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_a0c56feb29065f3a534b6f60c3eb5970_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-18_a0c56feb29065f3a534b6f60c3eb5970_karagany_mafia
-
Size
250KB
-
MD5
a0c56feb29065f3a534b6f60c3eb5970
-
SHA1
04b0a88fa72e963aa4537731099bcaf3302a17fa
-
SHA256
71a754b5f425109142db9aa38c370c5bc7550d4a91ea4b314751337256f5921c
-
SHA512
446be8384cb94c1d1a65194ce0183d12aa722af48cbc3860b1469333ae432011db1a24d09ef45abdcb429c303f6c570d63ebbe502484ee8d62ffa17d835529e1
-
SSDEEP
3072:W/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:W/y20Gj0r+EBFrkvlU3RvIUDOIN
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-