General
-
Target
2024-03-28_f2940c4d630e675f65da042a5ceb4d7c_karagany_mafia
-
Size
308KB
-
Sample
240328-djw27abc63
-
MD5
f2940c4d630e675f65da042a5ceb4d7c
-
SHA1
c4b0d29ab6ce52ec979ed87f905c000da1e43b34
-
SHA256
a4ddd8ef24883b5500cfb511e12f3e16519b332654e50d7804a2d2bccd69142e
-
SHA512
881330e9cc879c64c0472766fb575b15ed1524beb246457abe3812d4ba6584e6bb9209686fe9f4a511965f37cd13612f18724b7e67a311ef7d0e33d4c0f0ef05
-
SSDEEP
6144:tzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:jDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_f2940c4d630e675f65da042a5ceb4d7c_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_f2940c4d630e675f65da042a5ceb4d7c_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_f2940c4d630e675f65da042a5ceb4d7c_karagany_mafia
-
Size
308KB
-
MD5
f2940c4d630e675f65da042a5ceb4d7c
-
SHA1
c4b0d29ab6ce52ec979ed87f905c000da1e43b34
-
SHA256
a4ddd8ef24883b5500cfb511e12f3e16519b332654e50d7804a2d2bccd69142e
-
SHA512
881330e9cc879c64c0472766fb575b15ed1524beb246457abe3812d4ba6584e6bb9209686fe9f4a511965f37cd13612f18724b7e67a311ef7d0e33d4c0f0ef05
-
SSDEEP
6144:tzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:jDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-