General
-
Target
2024-04-11_fc3f287e8bd1599569d55e6a378ae722_karagany_mafia
-
Size
326KB
-
Sample
240411-fm56dach82
-
MD5
fc3f287e8bd1599569d55e6a378ae722
-
SHA1
65908b07f69586cbdc23ce02e6b6be0d293ccf6e
-
SHA256
1dff548f6bc018d89e72559d5634977a7196755ff25d0d00fceb6f59b33e622d
-
SHA512
6e6db35ae999b4676aaf2a24168a46ab6ece7a6138a4daa757d5b22f2d66cce184e6a3a1ea2ada31d00374ae9ff051e2d1be64052458d36f9214b3d3ce48028e
-
SSDEEP
3072:a+V2GtObCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8JuR:aB3USTXkLHgPitjYVmq+9
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_fc3f287e8bd1599569d55e6a378ae722_karagany_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-11_fc3f287e8bd1599569d55e6a378ae722_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-11_fc3f287e8bd1599569d55e6a378ae722_karagany_mafia
-
Size
326KB
-
MD5
fc3f287e8bd1599569d55e6a378ae722
-
SHA1
65908b07f69586cbdc23ce02e6b6be0d293ccf6e
-
SHA256
1dff548f6bc018d89e72559d5634977a7196755ff25d0d00fceb6f59b33e622d
-
SHA512
6e6db35ae999b4676aaf2a24168a46ab6ece7a6138a4daa757d5b22f2d66cce184e6a3a1ea2ada31d00374ae9ff051e2d1be64052458d36f9214b3d3ce48028e
-
SSDEEP
3072:a+V2GtObCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8JuR:aB3USTXkLHgPitjYVmq+9
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-