General
-
Target
2024-04-23_7b6c67789966b64e1297a7e0483a561b_mafia
-
Size
316KB
-
Sample
240423-fddd1adc36
-
MD5
7b6c67789966b64e1297a7e0483a561b
-
SHA1
2bae13339c82a11248a77ea15a5a0f195d9c5eac
-
SHA256
10273b3d575db4b22f7bffc30b1fa34dbb6629b7058761f6203b637b0274f865
-
SHA512
6864828460415e8751fe46427d205ac8c56110eadc9fc3bfac692501bbab113fdb23c4bbc7ae27e97dc6eb0c30137cb48b6c1d388a1e220ab2a118e4f901287f
-
SSDEEP
6144:LvmCNMO1UnseVgkV0xwvfxnhLTiusLe1740c:a8M0Unsna5mut40c
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_7b6c67789966b64e1297a7e0483a561b_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_7b6c67789966b64e1297a7e0483a561b_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-23_7b6c67789966b64e1297a7e0483a561b_mafia
-
Size
316KB
-
MD5
7b6c67789966b64e1297a7e0483a561b
-
SHA1
2bae13339c82a11248a77ea15a5a0f195d9c5eac
-
SHA256
10273b3d575db4b22f7bffc30b1fa34dbb6629b7058761f6203b637b0274f865
-
SHA512
6864828460415e8751fe46427d205ac8c56110eadc9fc3bfac692501bbab113fdb23c4bbc7ae27e97dc6eb0c30137cb48b6c1d388a1e220ab2a118e4f901287f
-
SSDEEP
6144:LvmCNMO1UnseVgkV0xwvfxnhLTiusLe1740c:a8M0Unsna5mut40c
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-