Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_1dfa29914852eec9f1273a31dbee140c_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_1dfa29914852eec9f1273a31dbee140c_karagany_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_1dfa29914852eec9f1273a31dbee140c_karagany_mafia
-
Size
274KB
-
MD5
1dfa29914852eec9f1273a31dbee140c
-
SHA1
3904509bc299349e3ef445f52f658c6c4e1491ba
-
SHA256
98bad0f9bce5df78315abadccd97721de25b9938e738b8423a5475f81c4236c2
-
SHA512
0ef07cc6e701532f4fa62cd4a325c6607e78b0c2db43c3c210ca6783329aedafc669085f403efe546c40266a880f54e87dca9a232ddeb0ef65e34a9de2dca88e
-
SSDEEP
3072:pf7t9cM2vyJMqzp2HlU5G8NjxbOFqrIXq/clBqwumoVKjnw/ZKwBHDfKdCCg:pfF2aMqzAz8NjxbbGqElBzToKjWgED4M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-19_1dfa29914852eec9f1273a31dbee140c_karagany_mafia
Files
-
2024-03-19_1dfa29914852eec9f1273a31dbee140c_karagany_mafia.exe windows:5 windows x86 arch:x86
25a354ef42e3199f48f46c425cd503de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
FindActCtxSectionStringW
SetVolumeMountPointA
GetProcAddress
LoadLibraryW
GetQueuedCompletionStatus
GlobalDeleteAtom
GetCPInfoExA
lstrlenW
WriteConsoleW
ReadFile
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
RtlUnwind
RaiseException
GetLastError
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapAlloc
LCMapStringW
GetCPInfo
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
CloseHandle
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetProcessHeap
CreateFileW
ole32
CoGetCurrentProcess
Sections
.text Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.htext Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE