General
-
Target
2024-04-01_a1d76cee020489aaf70f23680f3b00d6_karagany_mafia
-
Size
250KB
-
Sample
240401-ffh29sdh4x
-
MD5
a1d76cee020489aaf70f23680f3b00d6
-
SHA1
342be1c9f85fc745b869c89b31445af261d75734
-
SHA256
4f0ecf1a3b9414bcb6b866d795231648618468865ece9be36f6a92380abb627f
-
SHA512
c9b96cf7bf5e0cdf8ad6a5c30bfb0a2b586e67bb2ef7b7367beaa6f107e228aaa8d3672277f066f890523b140509a780305d057b165839f07a774a3c4d3df7e1
-
SSDEEP
6144:C+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:eOCjaklYgVIpxIhDtR
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-01_a1d76cee020489aaf70f23680f3b00d6_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-01_a1d76cee020489aaf70f23680f3b00d6_karagany_mafia.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2024-04-01_a1d76cee020489aaf70f23680f3b00d6_karagany_mafia
-
Size
250KB
-
MD5
a1d76cee020489aaf70f23680f3b00d6
-
SHA1
342be1c9f85fc745b869c89b31445af261d75734
-
SHA256
4f0ecf1a3b9414bcb6b866d795231648618468865ece9be36f6a92380abb627f
-
SHA512
c9b96cf7bf5e0cdf8ad6a5c30bfb0a2b586e67bb2ef7b7367beaa6f107e228aaa8d3672277f066f890523b140509a780305d057b165839f07a774a3c4d3df7e1
-
SSDEEP
6144:C+YrOIBjaklexBgiJ8sTSIkIpxIp8mDtfPBRwasxXq:eOCjaklYgVIpxIhDtR
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-