General
-
Target
2025-01-16_f95a10ed8b8d5425ef792530de0227f9_mafia
-
Size
319KB
-
Sample
250116-bany4strbq
-
MD5
f95a10ed8b8d5425ef792530de0227f9
-
SHA1
eee82d10af19030696e18ee80d9b2b5b48dc58cb
-
SHA256
2923770ba9eaf2c432eb745bbed7a19b1aadd6854086cc1f38df957adeedd0ab
-
SHA512
b0703b43b092b9c0d3011836dcda4a09044ae308eac49aed1ac04652560d74241fe21ff76f48f22a0c485293ff624f23a32666a16e1b888b98db132b052b03ab
-
SSDEEP
3072:HLFqoITs8+GgzXKhp6vFcBNTjbL617AL6MfUL1OeV7LGyH0Bme3BdcpFbMT9O:HLFAYz7z6hp2W1L61ALCOk7LhdeROuO
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-16_f95a10ed8b8d5425ef792530de0227f9_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-16_f95a10ed8b8d5425ef792530de0227f9_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-16_f95a10ed8b8d5425ef792530de0227f9_mafia
-
Size
319KB
-
MD5
f95a10ed8b8d5425ef792530de0227f9
-
SHA1
eee82d10af19030696e18ee80d9b2b5b48dc58cb
-
SHA256
2923770ba9eaf2c432eb745bbed7a19b1aadd6854086cc1f38df957adeedd0ab
-
SHA512
b0703b43b092b9c0d3011836dcda4a09044ae308eac49aed1ac04652560d74241fe21ff76f48f22a0c485293ff624f23a32666a16e1b888b98db132b052b03ab
-
SSDEEP
3072:HLFqoITs8+GgzXKhp6vFcBNTjbL617AL6MfUL1OeV7LGyH0Bme3BdcpFbMT9O:HLFAYz7z6hp2W1L61ALCOk7LhdeROuO
Score10/10-
GandCrab payload
-
Gandcrab family
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-