General
-
Target
2024-03-31_e2d25512be0298fc5372134d83add9e2_karagany_mafia
-
Size
250KB
-
Sample
240331-myteaaad9y
-
MD5
e2d25512be0298fc5372134d83add9e2
-
SHA1
9cd787396cfa05296ac590dcd116956a77e6a331
-
SHA256
a4dcf098f6c983ba735e98c9106c9ff8dce47d7601cee3c6d34939d61507ca25
-
SHA512
78719af222ed8cb4f8a1112975bcdda698b7e3de936dae9f3f439b1598e991e492983b6717a4453967c2ec4b9d7cde7fcda791db808d107257e080bf076ca134
-
SSDEEP
6144:p+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:pOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-31_e2d25512be0298fc5372134d83add9e2_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-31_e2d25512be0298fc5372134d83add9e2_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-31_e2d25512be0298fc5372134d83add9e2_karagany_mafia
-
Size
250KB
-
MD5
e2d25512be0298fc5372134d83add9e2
-
SHA1
9cd787396cfa05296ac590dcd116956a77e6a331
-
SHA256
a4dcf098f6c983ba735e98c9106c9ff8dce47d7601cee3c6d34939d61507ca25
-
SHA512
78719af222ed8cb4f8a1112975bcdda698b7e3de936dae9f3f439b1598e991e492983b6717a4453967c2ec4b9d7cde7fcda791db808d107257e080bf076ca134
-
SSDEEP
6144:p+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:pOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-