General
-
Target
2024-03-27_9497af7d0cc97717c5855957e8facd21_karagany_mafia
-
Size
250KB
-
Sample
240327-py8v3sfe3t
-
MD5
9497af7d0cc97717c5855957e8facd21
-
SHA1
e811a3832779bfb941cddb675f2ecc629920ad1a
-
SHA256
35e078103825d65b65d429656534ae33d42bac1f59523b0f49c31b383bc5a845
-
SHA512
a696b533edf01641326667ac1ff27ef8c4370d3953d342f67ef9aba696e23a74c71b24fbaae85cf0722967ae0aed219a3ab609d8ed6f9d58792cfa6b552238e3
-
SSDEEP
6144:3+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:rOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_9497af7d0cc97717c5855957e8facd21_karagany_mafia.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-27_9497af7d0cc97717c5855957e8facd21_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-27_9497af7d0cc97717c5855957e8facd21_karagany_mafia
-
Size
250KB
-
MD5
9497af7d0cc97717c5855957e8facd21
-
SHA1
e811a3832779bfb941cddb675f2ecc629920ad1a
-
SHA256
35e078103825d65b65d429656534ae33d42bac1f59523b0f49c31b383bc5a845
-
SHA512
a696b533edf01641326667ac1ff27ef8c4370d3953d342f67ef9aba696e23a74c71b24fbaae85cf0722967ae0aed219a3ab609d8ed6f9d58792cfa6b552238e3
-
SSDEEP
6144:3+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:rOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-