Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_85069fffac91b86af15c3b5703d80ce6_bkransomware_karagany.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-04-28_85069fffac91b86af15c3b5703d80ce6_bkransomware_karagany.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-28_85069fffac91b86af15c3b5703d80ce6_bkransomware_karagany
-
Size
98KB
-
MD5
85069fffac91b86af15c3b5703d80ce6
-
SHA1
d82289f074cf75801a1506b547148ffeb1ee0d48
-
SHA256
bbfb63717a2fff8877dea98d519d335092ea5a43bd8fb41d558308d0b75dcc11
-
SHA512
46e9751f242144c93fc1ee287bd8f86deb8d2f8f7cae2b33612ca0f5bda3a18fcbafc60d5facc44435af88ca8b3a728808d7138b37163f3e025b39017183bd06
-
SSDEEP
1536:8n4vPkr9YslKUAiNUm2dsEw1t8+ycYsvssWjcdaD5Mhzbar:vsYsoURNUw8+IsvzaD6hK
Malware Config
Signatures
Files
-
2024-04-28_85069fffac91b86af15c3b5703d80ce6_bkransomware_karagany.exe windows:5 windows x86 arch:x86
27b65b3f14c65973cd94c72c88db250d
Code Sign
b1:65:4d:ae:3d:f1:5f:30:c8:89:2f:e5:fe:8d:1b:d5:50:91:1c:7cSigner
Actual PE Digestb1:65:4d:ae:3d:f1:5f:30:c8:89:2f:e5:fe:8d:1b:d5:50:91:1c:7cDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
D:\private\NewHope\inst\Release\inst.pdb
Imports
kernel32
CopyFileW
DeleteFileW
Sleep
GetModuleFileNameW
GetLastError
GetFileAttributesW
CreateProcessW
CreateDirectoryW
CloseHandle
WriteConsoleW
SetFilePointerEx
GetCommandLineW
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
RaiseException
RtlUnwind
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
HeapSize
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
LCMapStringW
HeapReAlloc
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
CreateFileW
advapi32
ControlService
CloseServiceHandle
OpenServiceW
OpenSCManagerW
DeleteService
shell32
SHGetSpecialFolderPathW
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ