General
-
Target
2024-04-22_f972d2ca09243809e4f8f8d65e23415a_karagany_mafia
-
Size
308KB
-
Sample
240422-y58y4afg53
-
MD5
f972d2ca09243809e4f8f8d65e23415a
-
SHA1
da15d694c60d2e0803d0be67fad75535a6ea9f7b
-
SHA256
0166404817d3d00b4d4dbe6bd4e90b4996e050e928ada9195f311fedaa47c96a
-
SHA512
22b26ed010bdadc1068db8af97f944ca44eee1f88cc6b57b819544f7661231dab3dd9cf7cf996b346009e9cd5fe3af9b79da9f08bdfa6c3ddc309b75ce646deb
-
SSDEEP
6144:OzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:MDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_f972d2ca09243809e4f8f8d65e23415a_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_f972d2ca09243809e4f8f8d65e23415a_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-22_f972d2ca09243809e4f8f8d65e23415a_karagany_mafia
-
Size
308KB
-
MD5
f972d2ca09243809e4f8f8d65e23415a
-
SHA1
da15d694c60d2e0803d0be67fad75535a6ea9f7b
-
SHA256
0166404817d3d00b4d4dbe6bd4e90b4996e050e928ada9195f311fedaa47c96a
-
SHA512
22b26ed010bdadc1068db8af97f944ca44eee1f88cc6b57b819544f7661231dab3dd9cf7cf996b346009e9cd5fe3af9b79da9f08bdfa6c3ddc309b75ce646deb
-
SSDEEP
6144:OzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:MDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-