General
-
Target
2024-04-01_939f5560167a40080438345e62b78404_karagany_mafia
-
Size
250KB
-
Sample
240401-ejmdesdd68
-
MD5
939f5560167a40080438345e62b78404
-
SHA1
d9ebfe78d13fd3b5bdea4fc7823213ba534eef69
-
SHA256
76f8de495910946c88f7fdb29e2ee18337b118a2621787c01ecfd1750dc4f7ed
-
SHA512
ede56c424c70e908663b45844f9b1c27eddf331766794a1aae639871fd0b2bb00805de185e7612a110fd20686bfc2df00d75d2b17c6703507c1a4b52f9c84d5e
-
SSDEEP
6144:B+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:hOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-01_939f5560167a40080438345e62b78404_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-01_939f5560167a40080438345e62b78404_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-01_939f5560167a40080438345e62b78404_karagany_mafia
-
Size
250KB
-
MD5
939f5560167a40080438345e62b78404
-
SHA1
d9ebfe78d13fd3b5bdea4fc7823213ba534eef69
-
SHA256
76f8de495910946c88f7fdb29e2ee18337b118a2621787c01ecfd1750dc4f7ed
-
SHA512
ede56c424c70e908663b45844f9b1c27eddf331766794a1aae639871fd0b2bb00805de185e7612a110fd20686bfc2df00d75d2b17c6703507c1a4b52f9c84d5e
-
SSDEEP
6144:B+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:hOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-