F:\racket\Racket.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_d3cd662038b30521538eb6e536f9252c_karagany_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-21_d3cd662038b30521538eb6e536f9252c_karagany_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-21_d3cd662038b30521538eb6e536f9252c_karagany_mafia
-
Size
190KB
-
MD5
d3cd662038b30521538eb6e536f9252c
-
SHA1
63cfa76ed7a639591f6e8c1354e8abf9ad17c7d6
-
SHA256
1ab0bac893a88d8799743837a53132c3f2f3810c24e821dcfd1d38612a8192c2
-
SHA512
a202f1b85e46eeb48b0c5eb0b5df57f032b6caa8cc5af023a95ce7b6ffdf2cbfd0511fc747e68aa622cc1fca50bc28c7474671c570ac908a4939333fc1b15b03
-
SSDEEP
1536:++nbmT5+8+xIHYmwoeqZeU13H5aeVXWb70ETp9HxcxC1YEJf+LGTSMfeJIoUHoRU:xniVF+7oeNUjBR+ZYW+LASw8MTkx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-21_d3cd662038b30521538eb6e536f9252c_karagany_mafia
Files
-
2024-05-21_d3cd662038b30521538eb6e536f9252c_karagany_mafia.exe windows:5 windows x86 arch:x86
c4a0c3ac9768d344a90a47469c18e865
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
LoadLibraryW
GetModuleFileNameW
GlobalAlloc
CloseHandle
ReadFile
SetFilePointer
CreateFileW
SetConsoleCtrlHandler
LocalAlloc
LocalFree
GetProcAddress
FreeLibrary
InterlockedExchange
GetLastError
LoadLibraryA
RaiseException
EnumSystemLocalesA
GetLocaleInfoA
HeapAlloc
GetModuleHandleW
DecodePointer
EnterCriticalSection
LeaveCriticalSection
EncodePointer
GetCommandLineW
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
HeapCreate
HeapDestroy
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FatalAppExitA
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetHandleCount
GetFileType
GetStartupInfoW
Sleep
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
RtlUnwind
CompareStringW
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
HeapReAlloc
GetStringTypeW
GetUserDefaultLCID
IsValidLocale
user32
MessageBoxW
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ