General
-
Target
2024-04-26_46bbbaf5f2214db4f9dda2120b2e43b2_karagany_mafia
-
Size
308KB
-
Sample
240426-r52rfsdg97
-
MD5
46bbbaf5f2214db4f9dda2120b2e43b2
-
SHA1
2ea50b82b4712218d322a2bc0a296552111bd31b
-
SHA256
4c627bd7eac3f6ada4ebf45c0b22e79b1021ac02718db806c75b8619dda1b9ff
-
SHA512
c3265307837216e0a3012cf3d3c511375778852a1f32fd603e66df744862b0a8272b0cc36f77b5b453bd7de83de4543fd14e419daaac6a232f75daa73faa7fda
-
SSDEEP
6144:rzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:ZDHNam62ZdKmZmuPH
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-26_46bbbaf5f2214db4f9dda2120b2e43b2_karagany_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-26_46bbbaf5f2214db4f9dda2120b2e43b2_karagany_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-26_46bbbaf5f2214db4f9dda2120b2e43b2_karagany_mafia
-
Size
308KB
-
MD5
46bbbaf5f2214db4f9dda2120b2e43b2
-
SHA1
2ea50b82b4712218d322a2bc0a296552111bd31b
-
SHA256
4c627bd7eac3f6ada4ebf45c0b22e79b1021ac02718db806c75b8619dda1b9ff
-
SHA512
c3265307837216e0a3012cf3d3c511375778852a1f32fd603e66df744862b0a8272b0cc36f77b5b453bd7de83de4543fd14e419daaac6a232f75daa73faa7fda
-
SSDEEP
6144:rzL7ShWDLVzVNam6GxI29dqG3KdYAYqTuPZp:ZDHNam62ZdKmZmuPH
Score10/10-
GandCrab payload
-
Detects Reflective DLL injection artifacts
-
Detects ransomware indicator
-
Gandcrab Payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-