Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_b5fd83d272ad87b511502c255e413084_karagany_mafia_revil.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-10_b5fd83d272ad87b511502c255e413084_karagany_mafia_revil.exe
Resource
win10v2004-20240508-en
Target
2024-05-10_b5fd83d272ad87b511502c255e413084_karagany_mafia_revil
Size
2.0MB
MD5
b5fd83d272ad87b511502c255e413084
SHA1
c19f44bc97f36e9b5b87515d2193cf91c6a5b348
SHA256
ce7fc0e7d8f5c53788bb24267bbf8ecac728da264d268834f3c87ee352242fca
SHA512
c3ed73d474a3670d5bff1a54908667a21b0267e643f62e78b378ee6fac4581743b70d588869be5b9780e15d9e4d01f710b22a6fa227013b48ecef6ac9b11e3f9
SSDEEP
49152:2JUU968EZfFOr9ct76SKjlv8dxhAke2uPp/+00l2tbaaqvMFAK:ihWfFOr9cR69le9e2ux6OL
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\File_Transfer\27-Nov-20\remcom\3609015\REMCOM_BUILD\RemCom\Release\RemCom.pdb
WNetAddConnection2A
WNetCancelConnection2A
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetFileInformationByHandle
FindNextFileA
SetEnvironmentVariableA
CompareStringW
WriteConsoleW
IsValidLocale
GetSystemTime
SystemTimeToFileTime
WideCharToMultiByte
LoadLibraryA
FreeLibrary
GlobalMemoryStatus
QueryPerformanceCounter
GetTickCount
FlushConsoleInputBuffer
MultiByteToWideChar
GetFileType
GetVersion
GetCurrentThreadId
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
SetConsoleCtrlHandler
GetComputerNameA
DeleteFileA
SetLastError
GetFileSize
CreateProcessA
WaitForSingleObject
ReadFile
GetConsoleScreenBufferInfo
FillConsoleOutputCharacterA
SetConsoleCursorPosition
ExitThread
GetCurrentProcessId
SetConsoleTitleA
WaitNamedPipeA
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentDirectoryA
CreateFileA
WriteFile
CopyFileA
GetStdHandle
ReadConsoleA
GetConsoleMode
SetConsoleMode
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
GetLastError
GetDriveTypeW
FormatMessageA
LocalFree
GetModuleHandleA
GetProcAddress
GetCurrentProcess
PeekNamedPipe
SetCurrentDirectoryW
FindFirstFileA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
SetStdHandle
HeapSize
GetEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TryEnterCriticalSection
TlsFree
TlsGetValue
TlsSetValue
GetExitCodeThread
SetEvent
TlsAlloc
SetThreadPriority
InterlockedExchange
GetCurrentDirectoryW
GetLongPathNameW
GetSystemDirectoryW
GetTempPathW
ExpandEnvironmentStringsW
GetLogicalDriveStringsW
GetSystemTimeAsFileTime
CreateEventW
GetSystemInfo
GetEnvironmentVariableW
SetEnvironmentVariableW
GetVersionExA
GetComputerNameW
GetVersionExW
CreateFileW
GetFileAttributesW
GetFileAttributesExW
SetFileTime
SetEndOfFile
SetFilePointer
SetFileAttributesW
CopyFileW
MoveFileExW
DeleteFileW
RemoveDirectoryW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
CreateMutexW
ReleaseMutex
ResetEvent
WaitForMultipleObjects
InitializeCriticalSection
EncodePointer
DecodePointer
InterlockedCompareExchange
RaiseException
RtlUnwind
GetModuleHandleW
ExitProcess
ResumeThread
CreateThread
MoveFileA
GetCommandLineA
HeapSetInformation
HeapReAlloc
ReadConsoleInputA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
HeapDestroy
GetCurrentThread
SetHandleCount
GetStartupInfoW
FatalAppExitA
GetConsoleCP
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
GetModuleFileNameW
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
SetUserObjectSecurity
GetUserObjectSecurity
CloseDesktop
CloseWindowStation
GetDC
ReleaseDC
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
GetDeviceCaps
CreateCompatibleBitmap
GetObjectA
GetDIBits
DeleteObject
GetAclInformation
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
AllocateAndInitializeSid
FreeSid
EqualSid
GetTokenInformation
OpenProcessToken
CryptDecrypt
CryptCreateHash
CryptSetHashParam
CryptSignHashA
CryptDestroyHash
CryptExportKey
CryptGetUserKey
CryptAcquireContextA
CryptGetProvParam
CryptDestroyKey
CryptReleaseContext
CryptEnumProvidersA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RevertToSelf
ImpersonateLoggedOnUser
CreateProcessAsUserA
AddAccessAllowedAce
GetSecurityDescriptorDacl
CryptGenRandom
InitializeAcl
GetAce
AddAce
LogonUserA
CreateProcessWithLogonW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
GetLengthSid
CopySid
GetAdaptersInfo
CertFreeCertificateContext
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertDuplicateCertificateContext
shutdown
WSAGetLastError
recv
WSASetLastError
send
closesocket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ