Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_9bc816f6beddc401947e48fd7b40f829_karagany_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-26_9bc816f6beddc401947e48fd7b40f829_karagany_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_9bc816f6beddc401947e48fd7b40f829_karagany_mafia
-
Size
5.2MB
-
MD5
9bc816f6beddc401947e48fd7b40f829
-
SHA1
6cc9ad84654ab999f23e64ced0eb92c2b57073a6
-
SHA256
3c695db3f8698fbf02fbf85c5f7e9680b33c381f8e6136ca77bc8125c06a0f54
-
SHA512
285b431852a9f471d8244a93018b8876d796ab259ec237460059aad2e2d975447899de2bb7a5cc6ec86a7689ec8a18e89ecec7b424f8e899db5b1710d60fef81
-
SSDEEP
98304:OFd48fAnV60QjP3GUuSk+CaWSu+MK9JS+SBdVhuqSk6KcG2NfD:o3v0xou8S+xw6KcGu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-26_9bc816f6beddc401947e48fd7b40f829_karagany_mafia
Files
-
2024-05-26_9bc816f6beddc401947e48fd7b40f829_karagany_mafia.exe windows:5 windows x86 arch:x86
3537fcc338c694f9f29bfe853b919107
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
IsDBCSLeadByte
GetNativeSystemInfo
DeleteFileA
SetFileAttributesA
LockResource
LoadResource
SizeofResource
FindResourceA
FindClose
SetLastError
GetFullPathNameA
FindFirstFileA
GetLongPathNameA
FreeLibrary
LoadLibraryExA
GetModuleFileNameA
Sleep
ReadFile
GetFileSize
CloseHandle
CreateFileA
lstrlenA
SetEndOfFile
CreateFileW
WriteConsoleW
SetFilePointer
FlushFileBuffers
SetStdHandle
lstrlenW
LoadLibraryW
GetStringTypeW
LCMapStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapSize
HeapReAlloc
InterlockedIncrement
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
TerminateProcess
TlsFree
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
IsValidCodePage
GetOEMCP
GetACP
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
IsDebuggerPresent
RaiseException
InterlockedCompareExchange
InterlockedPushEntrySList
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
RtlUnwind
VirtualProtect
GetModuleHandleW
GetSystemInfo
VirtualQuery
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
SetUnhandledExceptionFilter
user32
SetWindowLongA
CharNextA
DestroyWindow
EndDialog
SendMessageA
GetWindowLongA
CheckDlgButton
ShowWindow
DefWindowProcA
GetActiveWindow
GetSystemMetrics
LoadImageA
EnableWindow
SetForegroundWindow
SetWindowTextA
DialogBoxParamA
GetWindowTextA
GetParent
GetWindowRect
MonitorFromWindow
GetMonitorInfoA
GetClientRect
MapWindowPoints
SetWindowPos
MessageBoxA
GetDlgItem
GetWindow
IsDlgButtonChecked
UnregisterClassA
gdi32
SetTextColor
GetStockObject
SetBkMode
advapi32
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
shlwapi
PathFileExistsA
comctl32
InitCommonControlsEx
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ