General
-
Target
2024-03-28_95735d46cb71033f559cad7cace52f10_mafia
-
Size
351KB
-
Sample
240328-q2s5gafe9w
-
MD5
95735d46cb71033f559cad7cace52f10
-
SHA1
76b4552fb3a7c02f1d39fb87fb6396363aad8b22
-
SHA256
67d7285849c008f9c773696709130349852b7d5ac2b4c50e7c19d49af8e83c34
-
SHA512
4f611d2aad8b9067420892e17a5c1a18b1fd9a8a7ab05157a5ffbbb21cd3658e79a1658b6e633a825317dc04fa3636419dfcf98490cf9ac61b7cd0ae8f47e11c
-
SSDEEP
3072:ipNMs+Kr1wbWGjl0xjsNNeVKBNVBxKT46xl+wndfIQQOaC3QBn7/hsb2BhGZ1/Nb:ipNMsLWEjsXjBATRpuuwnGD/Nj6a
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_95735d46cb71033f559cad7cace52f10_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-28_95735d46cb71033f559cad7cace52f10_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-28_95735d46cb71033f559cad7cace52f10_mafia
-
Size
351KB
-
MD5
95735d46cb71033f559cad7cace52f10
-
SHA1
76b4552fb3a7c02f1d39fb87fb6396363aad8b22
-
SHA256
67d7285849c008f9c773696709130349852b7d5ac2b4c50e7c19d49af8e83c34
-
SHA512
4f611d2aad8b9067420892e17a5c1a18b1fd9a8a7ab05157a5ffbbb21cd3658e79a1658b6e633a825317dc04fa3636419dfcf98490cf9ac61b7cd0ae8f47e11c
-
SSDEEP
3072:ipNMs+Kr1wbWGjl0xjsNNeVKBNVBxKT46xl+wndfIQQOaC3QBn7/hsb2BhGZ1/Nb:ipNMsLWEjsXjBATRpuuwnGD/Nj6a
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-