Static task
static1
Behavioral task
behavioral1
Sample
2024-06-24_08fdcd632e4fcbfff43e57e9d3392cca_karagany_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-24_08fdcd632e4fcbfff43e57e9d3392cca_karagany_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-24_08fdcd632e4fcbfff43e57e9d3392cca_karagany_mafia
-
Size
1.8MB
-
MD5
08fdcd632e4fcbfff43e57e9d3392cca
-
SHA1
b85a022230048c2475bcfd8fdb3248de90800150
-
SHA256
b37ef8cf03f81023f1ab2c0e09561e9b3792a3122ef744ee1900e8091d33d07f
-
SHA512
2f52bb7d1cc7cc41b87f8ff47c048e55be06cc255319aeb7ffefbc13015f7e8bc2db70ac1d457a013cdc93decb3f2339b7974410e7fa21b46a3a22ed63183945
-
SSDEEP
49152:otg7ETQsdtQCZwBUyW6Th1Mx7M7IQmNV/Xs69Sui9QSLjB:mtdtQ+wBUlzE6NV/smiCSLjB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-24_08fdcd632e4fcbfff43e57e9d3392cca_karagany_mafia
Files
-
2024-06-24_08fdcd632e4fcbfff43e57e9d3392cca_karagany_mafia.exe windows:5 windows x86 arch:x86
acbc8f761f4e19d096f011fd86326533
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
kernel32
RemoveDirectoryA
TlsSetValue
GetVersionExA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleFileNameW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCommandLineW
GetStartupInfoW
GetTempPathA
GetLastError
LoadLibraryExA
Sleep
CreateDirectoryA
SetStdHandle
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetFileType
DecodePointer
EncodePointer
SetConsoleCtrlHandler
HeapFree
GetModuleHandleW
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapAlloc
DeleteFileA
FindNextFileA
GetCommandLineA
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
SetHandleCount
GetStdHandle
DeleteCriticalSection
TlsAlloc
TlsGetValue
SetEnvironmentVariableW
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
WideCharToMultiByte
LoadLibraryW
WriteFile
GetFullPathNameA
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetFileAttributesA
MultiByteToWideChar
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringW
SetEnvironmentVariableA
HeapSize
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
LCMapStringW
WriteConsoleW
GetStringTypeW
CreateFileW
ws2_32
ntohl
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ