_StartHelp@12
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_ca92adea694c27b0eb80e3302a252af7_karagany_mafia.exe
Resource
win7-20231215-en
General
-
Target
2024-01-27_ca92adea694c27b0eb80e3302a252af7_karagany_mafia
-
Size
660KB
-
MD5
ca92adea694c27b0eb80e3302a252af7
-
SHA1
beddd69b29f70e3fffda87860a1a8823b783d114
-
SHA256
5f634e8edac8c196f895ee4ab3d5d14fede2387b683bbedfe76e5ac7af6c0cc4
-
SHA512
578327036a0ae970d2732656b7528795686274764ab3fae781a22a4ac54dc230c8e404f3c093ff692b316ffebf019227b6d8b18ecfdbf486ea133a8854e7a58c
-
SSDEEP
12288:+1lAjgp0QJx009NCBzbVl8dZHvj+coRr8qEFx1lPLHF8kuvusyOHqem3YpSA:+0Wc0rCtbVudZHvl4ROxr/uPyOKem3o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-27_ca92adea694c27b0eb80e3302a252af7_karagany_mafia
Files
-
2024-01-27_ca92adea694c27b0eb80e3302a252af7_karagany_mafia.exe windows:5 windows x86 arch:x86
175df80fe3c06d3e193e2504bf18aaa9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
ExpandEnvironmentStringsA
GetWindowsDirectoryA
GetSystemDirectoryA
GetVersionExA
lstrcpynA
GetPrivateProfileStringA
lstrcmpiA
GetModuleFileNameA
WinExec
GetVersion
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetLastError
FindFirstFileExA
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
lstrlenA
EnterCriticalSection
LoadLibraryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
lstrcpyA
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
RtlUnwind
HeapFree
Sleep
GetFileAttributesA
CloseHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetFileType
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeW
HeapAlloc
HeapSize
CreateFileA
HeapReAlloc
SetStdHandle
SetFilePointer
WriteConsoleW
GetTimeZoneInformation
SetEndOfFile
GetProcessHeap
ReadFile
CompareStringW
CreateFileW
lstrcatA
LeaveCriticalSection
TerminateProcess
user32
LoadCursorA
PostMessageA
SetWindowPos
ShowWindow
CreateWindowExA
UnregisterClassA
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassA
DefWindowProcA
DestroyWindow
PostQuitMessage
MessageBoxA
gdi32
GetStockObject
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
shell32
ShellExecuteA
Exports
Exports
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE