C:\Users\42258\Documents\Visual Studio 2010\Projects\~\Release\~.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_d3d0858693c479682186daea2380f626_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_d3d0858693c479682186daea2380f626_karagany_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_d3d0858693c479682186daea2380f626_karagany_mafia
-
Size
129KB
-
MD5
d3d0858693c479682186daea2380f626
-
SHA1
3799dd3ce2580ee896a8986c29e8b57e2e19a8ce
-
SHA256
7f61803ecb6552f68c649718af3f5aed955c3544891d2e02237b59c332884c14
-
SHA512
933a0e312c4a6094108080d5ec53b9647ab8861bab5c8679fe507d693e147e8f6d1363732ea65f8333234d9c39f6c0ce31f3918dd489bf719dd79f83701747b6
-
SSDEEP
1536:kB+ByT2yIfK7KeEpPyxY5eBOdHZoyz6Hd9ncBQ20nZYGGYjtT:K+XNPKBGd6HdYQ1nZYGJp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-25_d3d0858693c479682186daea2380f626_karagany_mafia
Files
-
2024-04-25_d3d0858693c479682186daea2380f626_karagany_mafia.exe windows:5 windows x86 arch:x86
b6e4226c4a694b1efd31205112fe7c48
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetLastError
GetConsoleWindow
GetModuleFileNameA
InterlockedDecrement
LocalFree
InitializeCriticalSection
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
LCMapStringW
GetStringTypeW
CreateFileW
HeapSize
IsValidCodePage
GetOEMCP
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineA
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
EncodePointer
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
Sleep
ReadFile
SetFilePointer
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetModuleFileNameW
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
HeapReAlloc
MultiByteToWideChar
SetStdHandle
WriteConsoleW
GetCPInfo
GetACP
user32
ShowWindow
advapi32
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
shell32
ShellExecuteExA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
urlmon
URLDownloadToFileA
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ