General
-
Target
2024-04-01_acf865eea4798aef28a6666f3dccd019_karagany_mafia
-
Size
258KB
-
Sample
240401-gjn85afa3z
-
MD5
acf865eea4798aef28a6666f3dccd019
-
SHA1
356a859753e6116d68853f397ec6538d6c810bd7
-
SHA256
55fe5abd90494eb94c041ef052d4dc5fe537e5b1f32d4b3aaf2701918fe1fb3d
-
SHA512
e8e3097e1e335ae0e6646f097c309ffae31b196d91186f41022c29e47f755ce141201f6c429d055d5c1e773660c8fb49f81037f06c0eb31ba23ba21902f75f12
-
SSDEEP
6144:gm1G8FVA6aJ/Ruvqdo1NGKXmhYvWVQMBCXaFhWzAJC:HFG6aJ/Qcu8Ykv2aFhUP
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-01_acf865eea4798aef28a6666f3dccd019_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-01_acf865eea4798aef28a6666f3dccd019_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-01_acf865eea4798aef28a6666f3dccd019_karagany_mafia
-
Size
258KB
-
MD5
acf865eea4798aef28a6666f3dccd019
-
SHA1
356a859753e6116d68853f397ec6538d6c810bd7
-
SHA256
55fe5abd90494eb94c041ef052d4dc5fe537e5b1f32d4b3aaf2701918fe1fb3d
-
SHA512
e8e3097e1e335ae0e6646f097c309ffae31b196d91186f41022c29e47f755ce141201f6c429d055d5c1e773660c8fb49f81037f06c0eb31ba23ba21902f75f12
-
SSDEEP
6144:gm1G8FVA6aJ/Ruvqdo1NGKXmhYvWVQMBCXaFhWzAJC:HFG6aJ/Qcu8Ykv2aFhUP
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-