General
-
Target
2024-04-01_b7ab3c848320c4d94b68f61c0fbb6124_karagany_mafia
-
Size
258KB
-
Sample
240401-gj8yjafd89
-
MD5
b7ab3c848320c4d94b68f61c0fbb6124
-
SHA1
6316ddb58bc4edeb06b7d4a736068b9bbdf2e49b
-
SHA256
a8b6cbfa4ea087c07999dca49201b12b06496ebc103e55153942b17198434a68
-
SHA512
a52cfd1f36ba9800f3670be7070f0f0e3ebf3d8e249b69742247f0c752fad8f3fefbf1a3e7e13b093ef50a54c221defa144ac2c9cd31552577e9bc7441888acd
-
SSDEEP
6144:am1G8FVA6aJ/Ruvqdo1NGKXmhYvWVQMBCXaFhWzAJC:NFG6aJ/Qcu8Ykv2aFhUP
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-01_b7ab3c848320c4d94b68f61c0fbb6124_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-01_b7ab3c848320c4d94b68f61c0fbb6124_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-01_b7ab3c848320c4d94b68f61c0fbb6124_karagany_mafia
-
Size
258KB
-
MD5
b7ab3c848320c4d94b68f61c0fbb6124
-
SHA1
6316ddb58bc4edeb06b7d4a736068b9bbdf2e49b
-
SHA256
a8b6cbfa4ea087c07999dca49201b12b06496ebc103e55153942b17198434a68
-
SHA512
a52cfd1f36ba9800f3670be7070f0f0e3ebf3d8e249b69742247f0c752fad8f3fefbf1a3e7e13b093ef50a54c221defa144ac2c9cd31552577e9bc7441888acd
-
SSDEEP
6144:am1G8FVA6aJ/Ruvqdo1NGKXmhYvWVQMBCXaFhWzAJC:NFG6aJ/Qcu8Ykv2aFhUP
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-