General
-
Target
2024-04-22_d3ba7310a11edb32995e36a3f7446a05_mafia
-
Size
316KB
-
Sample
240422-3fgwjahg4t
-
MD5
d3ba7310a11edb32995e36a3f7446a05
-
SHA1
70f73898cf007532720b312d6c97f5c90f0917c6
-
SHA256
7b8e74eef6db2fbc4772766c419d7833396adc9595b21912a69ad35434c8e597
-
SHA512
9a1656f3a393da74690a80f2129bb7793fbb483da206881919e0ddd9b1983e8413964e44387bd9f23cadbf28f02f15530e02dc9879599b6ccc243d859fef6eb7
-
SSDEEP
6144:Jv/ANMO1UnseVgkV0xwvfxnhLTiusLe1740c:VuM0Unsna5mut40c
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_d3ba7310a11edb32995e36a3f7446a05_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-22_d3ba7310a11edb32995e36a3f7446a05_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-22_d3ba7310a11edb32995e36a3f7446a05_mafia
-
Size
316KB
-
MD5
d3ba7310a11edb32995e36a3f7446a05
-
SHA1
70f73898cf007532720b312d6c97f5c90f0917c6
-
SHA256
7b8e74eef6db2fbc4772766c419d7833396adc9595b21912a69ad35434c8e597
-
SHA512
9a1656f3a393da74690a80f2129bb7793fbb483da206881919e0ddd9b1983e8413964e44387bd9f23cadbf28f02f15530e02dc9879599b6ccc243d859fef6eb7
-
SSDEEP
6144:Jv/ANMO1UnseVgkV0xwvfxnhLTiusLe1740c:VuM0Unsna5mut40c
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-