General
-
Target
2024-04-17_51cfd63b0d70cb555fa5764f1edffa32_karagany_mafia
-
Size
326KB
-
Sample
240417-1jf3aseh55
-
MD5
51cfd63b0d70cb555fa5764f1edffa32
-
SHA1
703470bbebabbbddddfa586d9237d9fc1b83cfab
-
SHA256
865db38110f45c2ae4a599134e0a3c8e9f6dea04afe452eca22dae2def56486f
-
SHA512
2b592dee90d5273e2179798fd14d3b0c27f3c5c3626f835a6f7f0062329dc848ff8bc7a544a22251071c3e5fdc3baa24ce85168f121f5d069489d95ef40092e6
-
SSDEEP
3072:o+V2GtCbCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju/:oB/USTXkLHgPitjYVmq+L
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_51cfd63b0d70cb555fa5764f1edffa32_karagany_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-17_51cfd63b0d70cb555fa5764f1edffa32_karagany_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-17_51cfd63b0d70cb555fa5764f1edffa32_karagany_mafia
-
Size
326KB
-
MD5
51cfd63b0d70cb555fa5764f1edffa32
-
SHA1
703470bbebabbbddddfa586d9237d9fc1b83cfab
-
SHA256
865db38110f45c2ae4a599134e0a3c8e9f6dea04afe452eca22dae2def56486f
-
SHA512
2b592dee90d5273e2179798fd14d3b0c27f3c5c3626f835a6f7f0062329dc848ff8bc7a544a22251071c3e5fdc3baa24ce85168f121f5d069489d95ef40092e6
-
SSDEEP
3072:o+V2GtCbCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju/:oB/USTXkLHgPitjYVmq+L
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-