General
-
Target
2024-03-28_b76b582e4130bdd34446e16e844fb60f_karagany_mafia
-
Size
250KB
-
Sample
240328-em5deaea8y
-
MD5
b76b582e4130bdd34446e16e844fb60f
-
SHA1
df45350dc55415636643f3a0dddbf99106818479
-
SHA256
5b8a8a82acde26d2306baaf912d3eea9c8373f4293a3fe313fe1fc7fe5b47439
-
SHA512
cc3f8316c2153dcf8bc269073ed5a50d0c3b30ba23659eb1212d177122e9d4458effe20be5a60bc1169c5f6e0890c5f0e61a8503fc4a45714a28467e705234ca
-
SSDEEP
6144:N+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:tOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_b76b582e4130bdd34446e16e844fb60f_karagany_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-28_b76b582e4130bdd34446e16e844fb60f_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_b76b582e4130bdd34446e16e844fb60f_karagany_mafia
-
Size
250KB
-
MD5
b76b582e4130bdd34446e16e844fb60f
-
SHA1
df45350dc55415636643f3a0dddbf99106818479
-
SHA256
5b8a8a82acde26d2306baaf912d3eea9c8373f4293a3fe313fe1fc7fe5b47439
-
SHA512
cc3f8316c2153dcf8bc269073ed5a50d0c3b30ba23659eb1212d177122e9d4458effe20be5a60bc1169c5f6e0890c5f0e61a8503fc4a45714a28467e705234ca
-
SSDEEP
6144:N+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:tOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-