General
-
Target
2024-03-24_1a46ed2180932b20bd809122d304fc0d_karagany_mafia
-
Size
250KB
-
Sample
240324-f611rscf91
-
MD5
1a46ed2180932b20bd809122d304fc0d
-
SHA1
0829dad7def972ba523f43e40105c3fb7ffe3b77
-
SHA256
e71e00dba1b0d6f8ea936997ce526185f925fecf5864f904df77bab00ccdb7c4
-
SHA512
99a217c3651c6916bd05adf355d60c6449c8c12f6a5017af970d0e33df4d53ea16a9f6fc8cb38070d213a324838da0b926b1bd2a91c1df975ccd4d6a9c195830
-
SSDEEP
3072:Y/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:Y/y20Gj0r+EBFrkvlU3RvIUDOIN
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-24_1a46ed2180932b20bd809122d304fc0d_karagany_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-24_1a46ed2180932b20bd809122d304fc0d_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-24_1a46ed2180932b20bd809122d304fc0d_karagany_mafia
-
Size
250KB
-
MD5
1a46ed2180932b20bd809122d304fc0d
-
SHA1
0829dad7def972ba523f43e40105c3fb7ffe3b77
-
SHA256
e71e00dba1b0d6f8ea936997ce526185f925fecf5864f904df77bab00ccdb7c4
-
SHA512
99a217c3651c6916bd05adf355d60c6449c8c12f6a5017af970d0e33df4d53ea16a9f6fc8cb38070d213a324838da0b926b1bd2a91c1df975ccd4d6a9c195830
-
SSDEEP
3072:Y/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:Y/y20Gj0r+EBFrkvlU3RvIUDOIN
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-