General
-
Target
2024-03-31_37e8f402152394d8756e2a1ced133d9d_karagany_mafia
-
Size
250KB
-
Sample
240331-sw1y8seb3y
-
MD5
37e8f402152394d8756e2a1ced133d9d
-
SHA1
f4b5753106ec13a5ea1bde269529e949e09b11da
-
SHA256
dd8a932c22a707b3e5091a1e62c83a0d93349fe76c603b36ce2853277856aa8f
-
SHA512
c23dd8a70633716d6672435a56d2ddd3b4a08952718463b01b70fd90d983ad7b457c9a194e554d71db8419ccf892a0db3182d5aaeef1b8a9a1b9f8d9248efaba
-
SSDEEP
6144:u+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:6OCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-31_37e8f402152394d8756e2a1ced133d9d_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-31_37e8f402152394d8756e2a1ced133d9d_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-03-31_37e8f402152394d8756e2a1ced133d9d_karagany_mafia
-
Size
250KB
-
MD5
37e8f402152394d8756e2a1ced133d9d
-
SHA1
f4b5753106ec13a5ea1bde269529e949e09b11da
-
SHA256
dd8a932c22a707b3e5091a1e62c83a0d93349fe76c603b36ce2853277856aa8f
-
SHA512
c23dd8a70633716d6672435a56d2ddd3b4a08952718463b01b70fd90d983ad7b457c9a194e554d71db8419ccf892a0db3182d5aaeef1b8a9a1b9f8d9248efaba
-
SSDEEP
6144:u+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:6OCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-