General
-
Target
2024-04-23_826809cab8fd91e10e39cc65e2ea8b29_karagany_mafia
-
Size
326KB
-
Sample
240423-ea62gacf4x
-
MD5
826809cab8fd91e10e39cc65e2ea8b29
-
SHA1
6a420e7996c8b2f62abeebee36f78a057d800a60
-
SHA256
e35dd2d22dcb5e7a9d6a18623e8dea795a34ee38445cf99c84374f1f6a69ce2e
-
SHA512
13282b82c8a505acd6c96f7a7c1356279fcf278b9c2167ac95db706cd0b3280ceaee6970004681660baa64d87190a5791f0e4c50fd2d05052bf4010a71c3e47c
-
SSDEEP
3072:k+V2GtCbCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju/:kB/USTXkLHgPitjYVmq+L
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_826809cab8fd91e10e39cc65e2ea8b29_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_826809cab8fd91e10e39cc65e2ea8b29_karagany_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-23_826809cab8fd91e10e39cc65e2ea8b29_karagany_mafia
-
Size
326KB
-
MD5
826809cab8fd91e10e39cc65e2ea8b29
-
SHA1
6a420e7996c8b2f62abeebee36f78a057d800a60
-
SHA256
e35dd2d22dcb5e7a9d6a18623e8dea795a34ee38445cf99c84374f1f6a69ce2e
-
SHA512
13282b82c8a505acd6c96f7a7c1356279fcf278b9c2167ac95db706cd0b3280ceaee6970004681660baa64d87190a5791f0e4c50fd2d05052bf4010a71c3e47c
-
SSDEEP
3072:k+V2GtCbCnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju/:kB/USTXkLHgPitjYVmq+L
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-