General
-
Target
2024-04-22_184a5d36950d45366bc41f3cf089b9b1_karagany_mafia
-
Size
326KB
-
Sample
240422-ke5l4ahe81
-
MD5
184a5d36950d45366bc41f3cf089b9b1
-
SHA1
e78e78a82e7d782980d446893bd26c6c7c6b1b71
-
SHA256
00fc067d9b392fa7fa747d8bcb702f6cdf6abfe1b3285c9f1f63c13d4b9d2df5
-
SHA512
0b65baef9498fa9ee0ba2a5860423235c84858b2dd901ea06b7f8adf7ad0b5b163b87b5fcf5bddf3e8602da369c21e61dc0b134938c2920a3c0259b08b633fe9
-
SSDEEP
3072:W+V2GtTbCnDlMTM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju3:WBEUuTXkLHgPitjYVmq+r
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_184a5d36950d45366bc41f3cf089b9b1_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_184a5d36950d45366bc41f3cf089b9b1_karagany_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-22_184a5d36950d45366bc41f3cf089b9b1_karagany_mafia
-
Size
326KB
-
MD5
184a5d36950d45366bc41f3cf089b9b1
-
SHA1
e78e78a82e7d782980d446893bd26c6c7c6b1b71
-
SHA256
00fc067d9b392fa7fa747d8bcb702f6cdf6abfe1b3285c9f1f63c13d4b9d2df5
-
SHA512
0b65baef9498fa9ee0ba2a5860423235c84858b2dd901ea06b7f8adf7ad0b5b163b87b5fcf5bddf3e8602da369c21e61dc0b134938c2920a3c0259b08b633fe9
-
SSDEEP
3072:W+V2GtTbCnDlMTM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju3:WBEUuTXkLHgPitjYVmq+r
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-