C:\norad\nsm\L4_5\src\cb\dhcpecho\WinRel\dhcpecho.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-28_f6284b118270ea6bc729ca5323ff43f9_karagany_mafia.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-06-28_f6284b118270ea6bc729ca5323ff43f9_karagany_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-28_f6284b118270ea6bc729ca5323ff43f9_karagany_mafia
-
Size
126KB
-
MD5
f6284b118270ea6bc729ca5323ff43f9
-
SHA1
eabec416ecf4565e7c8c3c3290639788bffca316
-
SHA256
98bc5a4b2f1049bc2ed59523edf6e5eb121180a0d4d9a866a89941e840ec96f2
-
SHA512
d1e46c1f1e3d03d24af01d56d07b6dd6c7ad0ef9a8fa737373f1af9c5e1619416b4e2eb409f480cdecdde5a82ad8939432f0c9f60b06f6578032d99ee02e8f22
-
SSDEEP
1536:VNZPKwbcS1Qf/N4Et3NqyTeTBZxwYTVkTjd2KUjHgF+RYOUpIFLzI:VjtbcS+fV6ae1ZxkTR2BjH3DDM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-28_f6284b118270ea6bc729ca5323ff43f9_karagany_mafia
Files
-
2024-06-28_f6284b118270ea6bc729ca5323ff43f9_karagany_mafia.exe windows:5 windows x86 arch:x86
ae54e2153321f9a94ee2132a3af01457
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wsock32
WSAStartup
socket
WSAGetLastError
gethostname
gethostbyname
inet_addr
ioctlsocket
htons
bind
recvfrom
ntohs
ntohl
sendto
closesocket
kernel32
GetModuleFileNameA
CloseHandle
HeapSize
WriteConsoleW
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
MultiByteToWideChar
LCMapStringW
FlushFileBuffers
GetLocaleInfoW
LoadLibraryW
Sleep
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
GetCurrentThread
GetProcAddress
IsProcessorFeaturePresent
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
CreateFileW
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ