General
-
Target
2024-04-01_523ffe23a773639c6c734e457df82a6c_karagany_mafia
-
Size
250KB
-
Sample
240401-c2zelabf59
-
MD5
523ffe23a773639c6c734e457df82a6c
-
SHA1
4e2dfdc6be530d979b552e83adfd43c8da9b8f2c
-
SHA256
5f983e822c0ba61da0f315cb8bdbf4f6cee29921275636a7866310e8dab197aa
-
SHA512
fa33ab307c1107db58eb7836f8aa97965a3d001706946c3a4462a2249150e700457d431db33d55c7e2eccd7bec7221bb8aec47f16224651dec9e7c1769ba7b2c
-
SSDEEP
6144:9+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:9OCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-01_523ffe23a773639c6c734e457df82a6c_karagany_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-01_523ffe23a773639c6c734e457df82a6c_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-01_523ffe23a773639c6c734e457df82a6c_karagany_mafia
-
Size
250KB
-
MD5
523ffe23a773639c6c734e457df82a6c
-
SHA1
4e2dfdc6be530d979b552e83adfd43c8da9b8f2c
-
SHA256
5f983e822c0ba61da0f315cb8bdbf4f6cee29921275636a7866310e8dab197aa
-
SHA512
fa33ab307c1107db58eb7836f8aa97965a3d001706946c3a4462a2249150e700457d431db33d55c7e2eccd7bec7221bb8aec47f16224651dec9e7c1769ba7b2c
-
SSDEEP
6144:9+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:9OCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-