General
-
Target
2024-03-22_1222c897089688537440f44782e2e30b_karagany_mafia
-
Size
308KB
-
Sample
240322-lev84acg4s
-
MD5
1222c897089688537440f44782e2e30b
-
SHA1
762b168c2ae9525be46e9622888506b65888102a
-
SHA256
af0700bdc5408bee32a0ac51e6856bf2a960756101b54b78cf6ce6993a0c6bdf
-
SHA512
3309daf725a0df4751345383658f645ca80d2acafc247c42f41bedfed3d2c58d3200c5f1462bff59277a706c7d66d0173202b5011ff4a8ecccec220aa3a7ffe7
-
SSDEEP
6144:AzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:mDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-22_1222c897089688537440f44782e2e30b_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-22_1222c897089688537440f44782e2e30b_karagany_mafia.exe
Resource
win10v2004-20240319-en
Malware Config
Targets
-
-
Target
2024-03-22_1222c897089688537440f44782e2e30b_karagany_mafia
-
Size
308KB
-
MD5
1222c897089688537440f44782e2e30b
-
SHA1
762b168c2ae9525be46e9622888506b65888102a
-
SHA256
af0700bdc5408bee32a0ac51e6856bf2a960756101b54b78cf6ce6993a0c6bdf
-
SHA512
3309daf725a0df4751345383658f645ca80d2acafc247c42f41bedfed3d2c58d3200c5f1462bff59277a706c7d66d0173202b5011ff4a8ecccec220aa3a7ffe7
-
SSDEEP
6144:AzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:mDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-