Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_e2555e8d3797bb9381295d9257dbbdf8_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-07_e2555e8d3797bb9381295d9257dbbdf8_karagany_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-07_e2555e8d3797bb9381295d9257dbbdf8_karagany_mafia
-
Size
303KB
-
MD5
e2555e8d3797bb9381295d9257dbbdf8
-
SHA1
1035d991b850afc454cc9a9a5d0d72ffefb018cd
-
SHA256
738af187f57ad3239d5d89e470253b4e0a3212d53dd53239af04852946f6fb8c
-
SHA512
11fb810f848a210ced894a1f080175d7f6092c212ddc174885ccdab1ed2dade3f3fba170a4e4a0ecc7b10359a50f38733af53367fb6c60b10ea1a54d2c60fb0e
-
SSDEEP
6144:IwgZV9I1+oRbIYRuNMVKFN2E6SXgHWezg5:IwgT9I4oRiN3M9Oe9g5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-07_e2555e8d3797bb9381295d9257dbbdf8_karagany_mafia
Files
-
2024-05-07_e2555e8d3797bb9381295d9257dbbdf8_karagany_mafia.exe windows:5 windows x86 arch:x86
3b9f030e1db7d97ee45a3b9330ae9ed1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFileTimeToFileTime
GetThreadContext
CreateConsoleScreenBuffer
GetMailslotInfo
FlushFileBuffers
TlsGetValue
IsDBCSLeadByte
LocalAlloc
GetTempPathA
FindVolumeMountPointClose
GetConsoleOutputCP
VirtualProtect
CreateMailslotA
lstrlenW
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
CreateFileW
SetStdHandle
SetFilePointer
WriteConsoleW
CloseHandle
SetCommBreak
GetModuleFileNameW
SetDefaultCommConfigA
SetFileShortNameW
GetNumberOfConsoleMouseButtons
WriteProfileSectionA
GetConsoleCP
DosDateTimeToFileTime
HeapSize
GetStringTypeW
LCMapStringW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapFree
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleMode
IsValidLocale
user32
HiliteMenuItem
LoadAcceleratorsW
GetPropW
GetMenuInfo
RemovePropW
AppendMenuA
SetDlgItemInt
gdi32
AddFontResourceW
CreateICW
PolyDraw
ResetDCW
SetICMProfileA
GetGlyphOutlineA
TranslateCharsetInfo
ole32
CoIsOle1Class
OleSave
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ