General
-
Target
2024-07-25_c7af0c864d3c5f28419b169aca0640a6_karagany_mafia_magniber
-
Size
308KB
-
Sample
240725-rvhwlatdnk
-
MD5
c7af0c864d3c5f28419b169aca0640a6
-
SHA1
57c278abb40174818683d6fe8a67ace049c17016
-
SHA256
673c0716865817079978c5a2fc46c7d765786702863117936329421c74bafb5e
-
SHA512
1231616b311a619e4879ee166a74cf407dedc1d935dadec8ea824701c5117e3051bd3f5cad7a8b1c4f3c3bed6c74f6b3f069b6ecf5598e3bfa9dbd609df1bfc3
-
SSDEEP
3072:cmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:cmBrrDDX0tXT30vzHF4Go0+Fs41
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-25_c7af0c864d3c5f28419b169aca0640a6_karagany_mafia_magniber.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-07-25_c7af0c864d3c5f28419b169aca0640a6_karagany_mafia_magniber.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
2024-07-25_c7af0c864d3c5f28419b169aca0640a6_karagany_mafia_magniber
-
Size
308KB
-
MD5
c7af0c864d3c5f28419b169aca0640a6
-
SHA1
57c278abb40174818683d6fe8a67ace049c17016
-
SHA256
673c0716865817079978c5a2fc46c7d765786702863117936329421c74bafb5e
-
SHA512
1231616b311a619e4879ee166a74cf407dedc1d935dadec8ea824701c5117e3051bd3f5cad7a8b1c4f3c3bed6c74f6b3f069b6ecf5598e3bfa9dbd609df1bfc3
-
SSDEEP
3072:cmBr3balBclw29DXaPB2J9ot3nPIGX30caGhDgGCcc4Go0ER5IY0ms41:cmBrrDDX0tXT30vzHF4Go0+Fs41
Score10/10-
GandCrab payload
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-