Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_6a1f560508ea9e42c88047752e93c4e9_karagany_mafia.exe
Resource
win7-20231129-en
General
-
Target
2024-02-17_6a1f560508ea9e42c88047752e93c4e9_karagany_mafia
-
Size
1.5MB
-
MD5
6a1f560508ea9e42c88047752e93c4e9
-
SHA1
5fd4cc75c434f6a94ac0487297649934e808047e
-
SHA256
6d03e7bb9ec26d4a178cdb2548d66dcee39bf517868928aee757cad851cb1630
-
SHA512
8fa2098313bcdb5fbedc5a8319a88fc7bd12377f11d0517fd316e2803c16968bb63341134b389a3aed07d7cce56d56c91c696215e94910a93ac289417fad1eb0
-
SSDEEP
12288:R9KNRCoH/uLJOyo937vGFWxwFJI+yeuVb8r+ZP712Ii+51cjVWtVj5J:RMb2JOt934J7Z6bQaj1BvUm9J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-17_6a1f560508ea9e42c88047752e93c4e9_karagany_mafia
Files
-
2024-02-17_6a1f560508ea9e42c88047752e93c4e9_karagany_mafia.exe windows:5 windows x86 arch:x86
7f8dbdb2a25c4c955f04f69a1e0e2540
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathW
shlwapi
PathAppendW
kernel32
GetStartupInfoW
CreateFileW
HeapReAlloc
LCMapStringW
HeapSize
WriteConsoleW
FlushFileBuffers
SetStdHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetLocaleInfoW
CopyFileW
CreateDirectoryW
WriteFile
OutputDebugStringA
GetProcAddress
LoadLibraryW
FreeLibrary
CloseHandle
CreateFileA
GetUserDefaultLCID
Sleep
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsProcessorFeaturePresent
MultiByteToWideChar
SetFilePointer
DeleteCriticalSection
GetFileType
GetLastError
HeapFree
HeapAlloc
RaiseException
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
HeapSetInformation
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
SetHandleCount
InitializeCriticalSectionAndSpinCount
user32
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
BeginPaint
EndPaint
PostQuitMessage
DefWindowProcA
DestroyWindow
DialogBoxParamA
PostMessageA
EndDialog
wsprintfW
ShowWindow
CreateWindowExA
LoadAcceleratorsA
SetWindowTextA
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE