General
-
Target
2024-03-28_2565a4435fb1e006b528ed44522db624_karagany_mafia
-
Size
250KB
-
Sample
240328-kd2ttagd2t
-
MD5
2565a4435fb1e006b528ed44522db624
-
SHA1
383e737f362afaa30ecb41be63c8c5b94e372175
-
SHA256
29f0b9a9948b30ecaf901df7e0b70172800a45b398f656669da4a899dd0191f4
-
SHA512
fb87a401e492d1566aead223f687519a1c6ae043dc805de4e0fbf9240a12d17f4f5ee9ca18b52d0e972fd803deca72addff461b7d6c8ee9660f443c1332db3b2
-
SSDEEP
3072:L/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:L/y20Gj0r+EBFrkvlU3RvIUDOIN
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_2565a4435fb1e006b528ed44522db624_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_2565a4435fb1e006b528ed44522db624_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_2565a4435fb1e006b528ed44522db624_karagany_mafia
-
Size
250KB
-
MD5
2565a4435fb1e006b528ed44522db624
-
SHA1
383e737f362afaa30ecb41be63c8c5b94e372175
-
SHA256
29f0b9a9948b30ecaf901df7e0b70172800a45b398f656669da4a899dd0191f4
-
SHA512
fb87a401e492d1566aead223f687519a1c6ae043dc805de4e0fbf9240a12d17f4f5ee9ca18b52d0e972fd803deca72addff461b7d6c8ee9660f443c1332db3b2
-
SSDEEP
3072:L/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:L/y20Gj0r+EBFrkvlU3RvIUDOIN
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-