General
-
Target
2024-03-31_571d67ea093bb5601b663df9b3df43fa_karagany_mafia
-
Size
250KB
-
Sample
240331-p3ah3scc67
-
MD5
571d67ea093bb5601b663df9b3df43fa
-
SHA1
9801e85f9e4bc735281b334c05e9dce7e38ce5e4
-
SHA256
a0f0e2bea9fd6048222761184a00ad20305d6bd54c380f99b70d589260e8fab5
-
SHA512
ad566a79b542f0266694d36501138d6628e2b8ae58761ac6ab78a4182d70257b21d37756a4059b6da9d5283dadf666cebe994b3f56a7a94e02db7a5de673b203
-
SSDEEP
3072:F/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:F/y20Gj0r+EBFrkvlU3RvIUDOIN
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-31_571d67ea093bb5601b663df9b3df43fa_karagany_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-31_571d67ea093bb5601b663df9b3df43fa_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-31_571d67ea093bb5601b663df9b3df43fa_karagany_mafia
-
Size
250KB
-
MD5
571d67ea093bb5601b663df9b3df43fa
-
SHA1
9801e85f9e4bc735281b334c05e9dce7e38ce5e4
-
SHA256
a0f0e2bea9fd6048222761184a00ad20305d6bd54c380f99b70d589260e8fab5
-
SHA512
ad566a79b542f0266694d36501138d6628e2b8ae58761ac6ab78a4182d70257b21d37756a4059b6da9d5283dadf666cebe994b3f56a7a94e02db7a5de673b203
-
SSDEEP
3072:F/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOd3:F/y20Gj0r+EBFrkvlU3RvIUDOIN
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-