D:\derek\dr\build_package\build_release-32\bin32\svccntrl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_c39485a1c3300463348eaa752784a506_karagany_mafia_ramnit.exe
Resource
win7-20240221-en
General
-
Target
2024-04-11_c39485a1c3300463348eaa752784a506_karagany_mafia_ramnit
-
Size
241KB
-
MD5
c39485a1c3300463348eaa752784a506
-
SHA1
e6c2ac85acc16434f818c065de1e5811098bc3b8
-
SHA256
21f3bd2c7515bfeef02b0295f97d0c68bf296c6004b88bba94d2b57ced08e95f
-
SHA512
10df37b93ba7270db64c1bf69ef70a9428d6e38703a81e5e667da610dc6c2ac896667ef4adad3aa2a9c7dc511b7b0297f61feaef4ef942d9a1d344410bb16983
-
SSDEEP
3072:dRu4T8pmpXyF/hpBE5fgq09o6GwuDpW2mmtRVQkIr05+u4dC5ehyreqv/kmDfE5T:dRu4TXyF/wpFJIy4hhyr2OMBEclDwg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-11_c39485a1c3300463348eaa752784a506_karagany_mafia_ramnit
Files
-
2024-04-11_c39485a1c3300463348eaa752784a506_karagany_mafia_ramnit.exe windows:5 windows x86 arch:x86
a86f2e6ad06451952f870f4d6270498e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
QueryServiceConfigW
OpenServiceW
EnumServicesStatusW
OpenSCManagerW
QueryServiceStatus
ChangeServiceConfigW
CloseServiceHandle
kernel32
GetLastError
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
HeapSetInformation
HeapFree
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
GetFileType
GetStartupInfoW
Sleep
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
LCMapStringW
GetStringTypeW
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE