Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
2024-05-01_15f31ec916335f16a7896427c025a938_karagany_mafia_metamorfo.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-01_15f31ec916335f16a7896427c025a938_karagany_mafia_metamorfo.exe
Resource
win10v2004-20240226-en
Target
2024-05-01_15f31ec916335f16a7896427c025a938_karagany_mafia_metamorfo
Size
15.5MB
MD5
15f31ec916335f16a7896427c025a938
SHA1
78d3adfc97b4e2f048253cd7a7b5841152602594
SHA256
68422398c90e0f2f49fc3abf982b7c9c02a6bbfbb97fb3dde29a23cf1ff00a00
SHA512
244059afbe05493520daf6866ed4c3b0bf6d90b83d47af3f11279d086c6e3bb35bfa43468cb76e1ee51c87800c0bcd05dd6b41822184222d6273d635ff9dd09e
SSDEEP
196608:zGDgL1GDgL7BnvjeApaAvktDvovydeG/Oas7FVr8oPVERBjbnhf8PIBS:atmNvjtIAvkavydenVrjERBjbn2wBS
resource | yara_rule |
---|---|
sample | family_blackmoon |
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
MicrosoftEdgeUpdate_unsigned.pdb
GetModuleFileNameW
GetLastError
CloseHandle
GetProcAddress
CreateProcessW
FreeLibrary
GetTempFileNameW
LoadLibraryExW
GetCommandLineW
GetModuleHandleW
WriteConsoleW
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
CreateDirectoryW
CreateFileW
DeleteFileW
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
RemoveDirectoryW
AreFileApisANSI
SetLastError
CopyFileW
MultiByteToWideChar
WideCharToMultiByte
FormatMessageW
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCPInfo
HeapAlloc
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
GetProcessHeap
HeapSize
HeapReAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
DecodePointer
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ