General
-
Target
2024-04-22_9333919aa7a71f9e4b134ba6776fcfad_karagany_mafia
-
Size
308KB
-
Sample
240422-zfa67sga36
-
MD5
9333919aa7a71f9e4b134ba6776fcfad
-
SHA1
f00d436c72831dcf728637f0f2ce183470df1c54
-
SHA256
646e2a0d6d2e07793b739592a6d122ff2f627d08c5011f26e9de41e3e17c4c0a
-
SHA512
773b0c19b43a151271ffdc8031d3d80703a0fa1db16e83666c56585c75af667989b513d5068c120cc7a05c84a7a83ac2a8b7af4d3ce810850c7d7f8cabeaffcf
-
SSDEEP
6144:czL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:qDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_9333919aa7a71f9e4b134ba6776fcfad_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_9333919aa7a71f9e4b134ba6776fcfad_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-22_9333919aa7a71f9e4b134ba6776fcfad_karagany_mafia
-
Size
308KB
-
MD5
9333919aa7a71f9e4b134ba6776fcfad
-
SHA1
f00d436c72831dcf728637f0f2ce183470df1c54
-
SHA256
646e2a0d6d2e07793b739592a6d122ff2f627d08c5011f26e9de41e3e17c4c0a
-
SHA512
773b0c19b43a151271ffdc8031d3d80703a0fa1db16e83666c56585c75af667989b513d5068c120cc7a05c84a7a83ac2a8b7af4d3ce810850c7d7f8cabeaffcf
-
SSDEEP
6144:czL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:qDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-