D:\derek\dr\build_package\build_release-32\bin32\DRload.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_0c555df975f9482922d42a4521438057_mafia_ramnit.exe
Resource
win7-20231129-en
General
-
Target
2024-02-19_0c555df975f9482922d42a4521438057_mafia_ramnit
-
Size
338KB
-
MD5
0c555df975f9482922d42a4521438057
-
SHA1
70e65b271c6dd796e38388178862e48355e33a1d
-
SHA256
1c88c1ce1b002be9a2deb6441d71f59319c438a65f3ba606052ba3187508046e
-
SHA512
ff577c0701d6bd69ce02d935a9cf1e0f605e79a703cca0a725c950d0c4f638f823e0e8d7613e3bc1702e29691501ee6385e71775747003a8b8e5ab8aeadf2836
-
SSDEEP
6144:ObyldNI1FnVi3i9nW2pcvMFpLt9QPC/Ti:ObQ6FnVi3ipWnMFP9JTi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-19_0c555df975f9482922d42a4521438057_mafia_ramnit
Files
-
2024-02-19_0c555df975f9482922d42a4521438057_mafia_ramnit.exe windows:5 windows x86 arch:x86
e6f218ccba1f8683abf0387e81dd110a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
MessageBeep
kernel32
FreeEnvironmentStringsW
EnumSystemLocalesA
MapViewOfFileEx
CloseHandle
CreateFileMappingW
GetLastError
CreateFileA
Sleep
VirtualQuery
GetProcAddress
LoadLibraryA
LoadLibraryExA
VirtualAllocEx
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesA
GetCommandLineA
HeapSetInformation
DecodePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
HeapFree
GetModuleHandleW
ExitProcess
FatalAppExitA
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
GetModuleFileNameW
GetModuleFileNameA
IsValidLocale
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
WriteConsoleW
MultiByteToWideChar
SetFilePointer
SetStdHandle
ReadFile
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
HeapSize
CreateFileW
SetEndOfFile
GetProcessHeap
GetUserDefaultLCID
GetLocaleInfoA
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 187KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE