General
-
Target
2024-04-11_d71f37fae19d9ddb38db345611b0fd7e_karagany_mafia
-
Size
326KB
-
Sample
240411-fhpmtsfh8y
-
MD5
d71f37fae19d9ddb38db345611b0fd7e
-
SHA1
95f12cf7fc6bc64c4a27422c19cd83fc0f4901c6
-
SHA256
88167641e7779f0a0810f59aeb7c346a4e91eebaa78bc8528b991bf2e1366951
-
SHA512
e8954d1d4727e535f8d3f946b5c09d644b9eb3ee48c006ad43d8007e69a6788b15cd5828eed7dbcb357a44b3a6b4953c172c07e33df853784280b68700928d74
-
SSDEEP
3072:x+V2GtCbCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju/:xB/USTXkLHgPitjYVmq+L
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_d71f37fae19d9ddb38db345611b0fd7e_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_d71f37fae19d9ddb38db345611b0fd7e_karagany_mafia.exe
Resource
win10v2004-20240319-en
Malware Config
Targets
-
-
Target
2024-04-11_d71f37fae19d9ddb38db345611b0fd7e_karagany_mafia
-
Size
326KB
-
MD5
d71f37fae19d9ddb38db345611b0fd7e
-
SHA1
95f12cf7fc6bc64c4a27422c19cd83fc0f4901c6
-
SHA256
88167641e7779f0a0810f59aeb7c346a4e91eebaa78bc8528b991bf2e1366951
-
SHA512
e8954d1d4727e535f8d3f946b5c09d644b9eb3ee48c006ad43d8007e69a6788b15cd5828eed7dbcb357a44b3a6b4953c172c07e33df853784280b68700928d74
-
SSDEEP
3072:x+V2GtCbCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju/:xB/USTXkLHgPitjYVmq+L
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-