General
-
Target
2024-04-22_cca3d627228b5dc278ec5a02397274a8_mafia
-
Size
316KB
-
Sample
240422-taq3ksdb9z
-
MD5
cca3d627228b5dc278ec5a02397274a8
-
SHA1
0cf689c9e4b377d8b762daaacf1dfdd89a4cca82
-
SHA256
4f32756f8a2ccf78796eeca15215faf7a24698cdf14046b1daee611ded107455
-
SHA512
220a6473b54e5d5c5ed54993a2ba56c57ba0449d9c45ee7c1cd7ff2e2d8a3f012a406375f3451023a258d4e5b74f23ff3ced1f5909fd20d443c320118afb1540
-
SSDEEP
6144:JvL3NMO1UnseVgkV0xwvfxnhLTiusLe1740U:ddM0Unsna5mut40U
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_cca3d627228b5dc278ec5a02397274a8_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-22_cca3d627228b5dc278ec5a02397274a8_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-22_cca3d627228b5dc278ec5a02397274a8_mafia
-
Size
316KB
-
MD5
cca3d627228b5dc278ec5a02397274a8
-
SHA1
0cf689c9e4b377d8b762daaacf1dfdd89a4cca82
-
SHA256
4f32756f8a2ccf78796eeca15215faf7a24698cdf14046b1daee611ded107455
-
SHA512
220a6473b54e5d5c5ed54993a2ba56c57ba0449d9c45ee7c1cd7ff2e2d8a3f012a406375f3451023a258d4e5b74f23ff3ced1f5909fd20d443c320118afb1540
-
SSDEEP
6144:JvL3NMO1UnseVgkV0xwvfxnhLTiusLe1740U:ddM0Unsna5mut40U
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-