General
-
Target
2024-04-26_215d840c07f9095ed25da0e76da3afb0_karagany_mafia
-
Size
308KB
-
Sample
240426-njr4cafd69
-
MD5
215d840c07f9095ed25da0e76da3afb0
-
SHA1
a7a1aa5ff8cad07acfd7cae03b1e7937a5be3003
-
SHA256
d8ef5c75776d57091969919bde32078ad376f336eef31b6d6359eea6c73b2810
-
SHA512
b97f1216ac1cc7a3616d0468bf9b498b7deff195c36b4c23b660c712a088776b78fdcc438885025035951bba40d8e8538f3324ed4c8c92a27096233a9282a01e
-
SSDEEP
6144:szL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:6DHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_215d840c07f9095ed25da0e76da3afb0_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-26_215d840c07f9095ed25da0e76da3afb0_karagany_mafia.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-26_215d840c07f9095ed25da0e76da3afb0_karagany_mafia
-
Size
308KB
-
MD5
215d840c07f9095ed25da0e76da3afb0
-
SHA1
a7a1aa5ff8cad07acfd7cae03b1e7937a5be3003
-
SHA256
d8ef5c75776d57091969919bde32078ad376f336eef31b6d6359eea6c73b2810
-
SHA512
b97f1216ac1cc7a3616d0468bf9b498b7deff195c36b4c23b660c712a088776b78fdcc438885025035951bba40d8e8538f3324ed4c8c92a27096233a9282a01e
-
SSDEEP
6144:szL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:6DHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-