General
-
Target
2024-03-31_1083430fed2af21bc996d14e382f5378_karagany_mafia
-
Size
250KB
-
Sample
240331-stsj3sea9w
-
MD5
1083430fed2af21bc996d14e382f5378
-
SHA1
cb5cc375a12a51b0adb33fd6afcd60e462d1bda0
-
SHA256
c4722c728ef6a8556eceb33bdff9bae742f9e01591c3bf91179299748c61750e
-
SHA512
9d448d44b70023cc95d96c38d7e02c62156ff5a7a2e3bdf3574a2cc656ab5a37b2e059ad0f8b4a236d53270d052bd63b9c033261e06a7464f00db4833b0a21ce
-
SSDEEP
6144:u+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:6OCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-31_1083430fed2af21bc996d14e382f5378_karagany_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-31_1083430fed2af21bc996d14e382f5378_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-03-31_1083430fed2af21bc996d14e382f5378_karagany_mafia
-
Size
250KB
-
MD5
1083430fed2af21bc996d14e382f5378
-
SHA1
cb5cc375a12a51b0adb33fd6afcd60e462d1bda0
-
SHA256
c4722c728ef6a8556eceb33bdff9bae742f9e01591c3bf91179299748c61750e
-
SHA512
9d448d44b70023cc95d96c38d7e02c62156ff5a7a2e3bdf3574a2cc656ab5a37b2e059ad0f8b4a236d53270d052bd63b9c033261e06a7464f00db4833b0a21ce
-
SSDEEP
6144:u+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:6OCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-