General
-
Target
2024-04-26_6c4816ef9cd422de5163a48c5af58da0_karagany_mafia
-
Size
326KB
-
Sample
240426-kztekadb7x
-
MD5
6c4816ef9cd422de5163a48c5af58da0
-
SHA1
e72ff2295b49de253c6672bba12032f89457f745
-
SHA256
c3202b41c7f61dd458cc54b64378c79dd5a9ce09609a624b36acec13e26a2e7e
-
SHA512
6dc1eec8bcc4406be916d1bd019f4b6768982fdd87f7f92bded86961efa16bd42d9eeaf72382dc9e1e39bcc36b86101b5aba84d046239fbbf3abc93e77729a38
-
SSDEEP
3072:I+V2GtCbnnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju3:IB/DSTXkLHgPitjYVmq+L
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_6c4816ef9cd422de5163a48c5af58da0_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-26_6c4816ef9cd422de5163a48c5af58da0_karagany_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-26_6c4816ef9cd422de5163a48c5af58da0_karagany_mafia
-
Size
326KB
-
MD5
6c4816ef9cd422de5163a48c5af58da0
-
SHA1
e72ff2295b49de253c6672bba12032f89457f745
-
SHA256
c3202b41c7f61dd458cc54b64378c79dd5a9ce09609a624b36acec13e26a2e7e
-
SHA512
6dc1eec8bcc4406be916d1bd019f4b6768982fdd87f7f92bded86961efa16bd42d9eeaf72382dc9e1e39bcc36b86101b5aba84d046239fbbf3abc93e77729a38
-
SSDEEP
3072:I+V2GtCbnnDl0TM87yRBNWwxnImfoP/KOBejjY6IaCDtm0zT5363kQ8Ju3:IB/DSTXkLHgPitjYVmq+L
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-