D:\dev\projects\mul\pc_tg\Svclm\Release\project1.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_244668e5db2026035db3e6eee26e065e_karagany_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-09_244668e5db2026035db3e6eee26e065e_karagany_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-09_244668e5db2026035db3e6eee26e065e_karagany_mafia
-
Size
3.3MB
-
MD5
244668e5db2026035db3e6eee26e065e
-
SHA1
296a68142c00e1b7cadd214eb858e9acd7ceeb74
-
SHA256
3750a76334b906607d56f5af65ebb7a591fc2faf989e584de02371cc3d35f652
-
SHA512
3d0a0a6632f3be036d988a4ace2c79e48d931c14fa27464c89c405feacdd3a716670a98664070c96ba7511f33791b6f3913989f7302ff191959fdc9b48112396
-
SSDEEP
49152:vYTy+eoLwBCV/oXw7P7N3sxgbjXinzeerF/xhTqytJFlcXC/:9+ZP/oXqzNcxg3inz9ppTlcXC/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-09_244668e5db2026035db3e6eee26e065e_karagany_mafia
Files
-
2024-06-09_244668e5db2026035db3e6eee26e065e_karagany_mafia.exe windows:5 windows x86 arch:x86
0e65f6f391112b9de0ab9293f895b0cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateThread
Sleep
WaitForMultipleObjects
GetWindowsDirectoryA
GetSystemDirectoryA
GetProcAddress
GetSystemInfo
GetVersionExA
GetTempPathA
GetProcessHeap
GetModuleFileNameA
GetStringTypeW
LCMapStringW
LoadLibraryW
HeapReAlloc
FlushFileBuffers
CreateToolhelp32Snapshot
CloseHandle
Process32Next
GetStartupInfoA
CreateProcessA
SetEndOfFile
Process32First
WriteConsoleW
SetStdHandle
CreateFileA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
EncodePointer
DecodePointer
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
ReadFile
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
HeapSize
GetModuleHandleW
ExitProcess
HeapCreate
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
CreateFileW
user32
DispatchMessageA
ShowWindow
UpdateWindow
LoadCursorA
PostQuitMessage
GetSystemMetrics
DefWindowProcA
RegisterClassExA
GetMessageA
LoadIconA
SendMessageA
TranslateMessage
CreateWindowExA
gdi32
CreateSolidBrush
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
wininet
InternetConnectA
InternetReadFile
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
netapi32
Netbios
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ