D:\Cooker\bin\patcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_78e85eb1a7651f643395e1714606df16_karagany_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-04_78e85eb1a7651f643395e1714606df16_karagany_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-04_78e85eb1a7651f643395e1714606df16_karagany_mafia
-
Size
14.9MB
-
MD5
78e85eb1a7651f643395e1714606df16
-
SHA1
71ed4810e30349ebcfd052271c4aebfb939bea51
-
SHA256
0fde0b4140262119e7a7f5efdc9b792065d26d341640f0bb16c4e91925f39658
-
SHA512
c03c60779fd7b9faf6d6168963cbd4d9c3da36aee36b3f66bf578dfef17e19a7733080986d0c6a26d29656a2274904088ccc3cf415ae3d4d227cb3352d05f7db
-
SSDEEP
196608:96zvFYswjqn+s9NWzJY1djKxguLGb5ZUm91i5abBpQamTRsB3fRy6di:2vrAQh9ukMyuLGVZJrhBSRMfhs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-04_78e85eb1a7651f643395e1714606df16_karagany_mafia
Files
-
2024-06-04_78e85eb1a7651f643395e1714606df16_karagany_mafia.exe windows:5 windows x86 arch:x86
73211b79828da9015e784cfa8a79f245
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
Sleep
SetThreadPriority
CreateThread
GetFileSize
SetFilePointer
WriteFile
ReadFile
CreateFileW
CloseHandle
OpenProcess
TerminateProcess
GetModuleFileNameW
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
GetCurrentProcessId
GetTempFileNameW
MapViewOfFile
UnmapViewOfFile
FindResourceW
LoadResource
CreateDirectoryW
SizeofResource
GetCurrentThread
GetCurrentDirectoryW
CreateFileMappingW
LockResource
CompareStringW
CreateFileA
GetFileAttributesA
GetProcessHeap
SetEndOfFile
InitializeCriticalSection
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringA
OutputDebugStringW
SetFileAttributesW
DeleteFileW
GetFileAttributesW
GetModuleHandleW
WaitForSingleObject
GetStringTypeW
GetTempPathW
CreateProcessW
LCMapStringW
RtlUnwind
GetLastError
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DecodePointer
EncodePointer
HeapReAlloc
MultiByteToWideChar
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
SetEnvironmentVariableA
user32
GetWindowThreadProcessId
GetMessageW
PostMessageW
EnumWindows
GetWindowTextLengthW
TranslateMessage
LoadIconW
GetDlgItem
SetWindowLongW
ShowWindow
CreateDialogParamW
SendMessageW
DispatchMessageW
MessageBoxW
SetForegroundWindow
advapi32
RegCloseKey
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetFolderPathW
ShellExecuteExW
comctl32
ord17
psapi
GetModuleFileNameExW
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 589KB - Virtual size: 588KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ