Static task
static1
Behavioral task
behavioral1
Sample
2023-08-22_091a1e79287d067d74a59ef830515e25_mafia_ramnit_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-22_091a1e79287d067d74a59ef830515e25_mafia_ramnit_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
2023-08-22_091a1e79287d067d74a59ef830515e25_mafia_ramnit_JC.exe
-
Size
1.1MB
-
MD5
091a1e79287d067d74a59ef830515e25
-
SHA1
ee543bba057b1d69c97279174016738a0dc6b7f3
-
SHA256
3ee689612dea5c4d1d8a6439e2f4dea36031300da2ed3a4e8e75538edf06b5b9
-
SHA512
a4d1c04dbd11328ef681a68e6f57616f5c3bc3f7689723e47f0215f6cf9bab1148b473a8acff15947139490075c36845054ece8124f8b4d5dc09ea66b2cd5a28
-
SSDEEP
24576:tnnGdqCZNmhXzcgmeGLKgvhkggaIVsHzCVO:tnGECwXKhDjTCVO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2023-08-22_091a1e79287d067d74a59ef830515e25_mafia_ramnit_JC.exe
Files
-
2023-08-22_091a1e79287d067d74a59ef830515e25_mafia_ramnit_JC.exe.exe windows x86
a66c9096cd1b03e8f00b14ec86f6fe81
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
ntohs
socket
closesocket
getpeername
getsockopt
htons
bind
getsockname
setsockopt
WSAIoctl
send
recv
select
WSAGetLastError
__WSAFDIsSet
WSASetLastError
WSAStartup
WSACleanup
wldap32
ord22
ord211
ord143
ord50
ord26
ord30
ord200
ord32
ord35
ord79
ord33
ord301
ord27
ord46
ord60
ord41
kernel32
GetProcAddress
CreateThread
Sleep
GetLocalTime
GetTickCount
CreateDirectoryA
GetLastError
GetShortPathNameA
CreateFileA
ExitProcess
CreateEventA
WaitForSingleObject
OutputDebugStringW
SetEvent
ResetEvent
OpenEventA
SetUnhandledExceptionFilter
LoadLibraryA
GetCurrentProcessId
GetCurrentProcess
TerminateProcess
LoadResource
LockResource
SizeofResource
FindResourceW
FindResourceExW
DeleteFileA
FileTimeToSystemTime
SystemTimeToFileTime
GlobalAlloc
GlobalFree
FindFirstFileA
FindNextFileA
FindClose
SetErrorMode
GetFileTime
SystemTimeToTzSpecificLocalTime
GetModuleFileNameW
GetCurrentThread
GetModuleHandleW
CopyFileA
InitializeCriticalSection
EnterCriticalSection
Process32First
DeleteCriticalSection
FreeLibrary
SuspendThread
ResumeThread
OpenFileMappingA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetModuleHandleExA
VirtualProtect
GetFileAttributesA
GetFullPathNameW
MultiByteToWideChar
GetThreadContext
SetThreadContext
TerminateThread
ExitThread
GetHandleInformation
SetLastError
FormatMessageA
SleepEx
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
VerifyVersionInfoA
VerSetConditionMask
GetSystemDirectoryA
lstrcpynA
OpenProcess
lstrcmpiA
CreateFileW
CompareStringW
GetProcessHeap
SetEndOfFile
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetStdHandle
CreateToolhelp32Snapshot
GetCurrentThreadId
WideCharToMultiByte
OutputDebugStringA
GetModuleHandleA
GetModuleFileNameA
GetConsoleMode
QueryPerformanceCounter
GetConsoleCP
GetStartupInfoW
SetHandleCount
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
InitializeCriticalSectionAndSpinCount
GetCurrentDirectoryW
TlsFree
TlsSetValue
CloseHandle
GetFullPathNameA
Process32Next
VirtualQuery
FlushInstructionCache
VirtualFree
VirtualAlloc
FlushFileBuffers
LeaveCriticalSection
GetEnvironmentStringsW
FreeEnvironmentStringsW
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
InterlockedCompareExchange
HeapFree
HeapAlloc
GetDriveTypeW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FindFirstFileExA
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetFileInformationByHandle
SetFilePointer
GetDriveTypeA
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
WriteFile
HeapSize
GetLocaleInfoW
TlsAlloc
TlsGetValue
user32
GetClassNameA
IsWindowVisible
EnumThreadWindows
EnumWindows
MessageBoxA
wsprintfA
GetCursorPos
GetForegroundWindow
GetWindowTextW
GetWindowTextA
GetWindowThreadProcessId
FindWindowA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CryptDestroyKey
CryptEncrypt
CryptReleaseContext
CryptImportKey
CryptAcquireContextA
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
setupapi
SetupDiGetClassDevsA
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInterfaces
psapi
GetModuleFileNameExA
EnumProcessModules
clifecrypt
RequestAesEncryptLength
AesCreateKeys
RequestAesCreateKeysLength
EccEncrypt
RequestEccEncryptLength
AesEncrypt
RequestRsaEncryptLength
RsaEncrypt
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 724KB - Virtual size: 724KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourd Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.detourc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 72KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 86KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE