Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_3edf78f2ea8a4532d2b92926f35618f7_hijackloader_karagany_mafia_revil.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-18_3edf78f2ea8a4532d2b92926f35618f7_hijackloader_karagany_mafia_revil.exe
Resource
win10v2004-20240802-en
Target
2024-08-18_3edf78f2ea8a4532d2b92926f35618f7_hijackloader_karagany_mafia_revil
Size
3.1MB
MD5
3edf78f2ea8a4532d2b92926f35618f7
SHA1
3c9e79c7b65570a0a6b77086a4000cfe7f6e16c5
SHA256
6f2435c92ff52540367d28d99afb4d6184ed5e081f7c3953235b79e0ebe11d3e
SHA512
aba080a9343677714bc3e72f66695bec63f9ca82c902476a5d51330a7bf327faad2583e1a3dac64ea97a56129afe4094345f24382b48a06d9756779b202fd5a7
SSDEEP
98304:Vg0EWak8xj8MrNYPZbY54maDmvpOL9bZQ/pJ:Vg0EB8Mrsb8Kmvpk9bO/v
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
d:\Webhost\13-08-2024\WindowsBuilds\DC_NATIVE\8894969\desktopcentral\ONPREMISE\REMCOM_BUILD\RemCom\Release\RemCom.pdb
WNetCancelConnection2A
WNetAddConnection2A
CertFreeCertificateContext
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertGetCertificateContextProperty
CertOpenStore
CertCloseStore
CryptMsgClose
CertGetNameStringW
CertGetNameStringA
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
getaddrinfo
inet_ntoa
accept
listen
closesocket
htons
bind
setsockopt
connect
send
WSASetLastError
recv
freeaddrinfo
getservbyname
getnameinfo
WSAStartup
WSAGetLastError
ntohs
getsockname
WSACleanup
gethostbyname
getsockopt
socket
ioctlsocket
FormatMessageA
HeapFree
GetProcessHeap
HeapAlloc
SetConsoleMode
GetConsoleMode
ReadConsoleA
GetStdHandle
CopyFileA
GetCurrentDirectoryA
FindResourceA
Sleep
WaitNamedPipeA
SetConsoleTitleA
GetCurrentProcessId
ExitThread
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
WaitForSingleObject
CreateProcessA
GetTickCount
SetLastError
GetComputerNameA
SetConsoleCtrlHandler
InterlockedDecrement
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
GetModuleHandleExW
GetEnvironmentVariableW
GetModuleHandleW
GetFileType
GetVersion
TlsGetValue
InterlockedCompareExchange
TlsSetValue
InitializeCriticalSectionAndSpinCount
InterlockedExchangeAdd
DeleteCriticalSection
GetCurrentThreadId
TlsAlloc
TlsFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
CreateFiber
SwitchToFiber
DeleteFiber
FormatMessageW
ReadConsoleW
ConvertThreadToFiber
ConvertFiberToThread
FreeLibrary
LoadLibraryW
LocalFree
FindFirstFileW
FindNextFileW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
CreateMutexW
GetSystemInfo
CreateEventW
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
GetTempPathW
GetSystemDirectoryW
GetLongPathNameW
FindClose
GetTimeZoneInformation
GetSystemTime
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
WideCharToMultiByte
MultiByteToWideChar
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
GetDiskFreeSpaceExW
CreateDirectoryW
RemoveDirectoryW
DeleteFileW
CreateHardLinkW
MoveFileExW
CopyFileW
SetFileAttributesW
SetFileTime
GetFileAttributesExW
GetFileAttributesW
TryEnterCriticalSection
SetThreadPriority
SetEvent
GetExitCodeThread
VirtualQuery
SetEndOfFile
lstrlenA
GetDriveTypeW
SetEnvironmentVariableA
CompareStringW
CreateFileW
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
DeleteFileA
WriteFile
GetVersionExA
CreateFileA
SetCurrentDirectoryW
GetCurrentDirectoryW
GetLocaleInfoA
GetUserDefaultLCID
GetFileSize
ReadFile
GetLastError
CloseHandle
LoadLibraryA
FindFirstFileA
InterlockedExchange
InitializeCriticalSection
EncodePointer
DecodePointer
RaiseException
HeapDestroy
HeapReAlloc
HeapSize
RtlUnwind
ExitProcess
ResumeThread
CreateThread
MoveFileA
GetCommandLineA
HeapSetInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapCreate
IsProcessorFeaturePresent
SetHandleCount
GetStartupInfoW
FatalAppExitA
GetConsoleCP
FlushFileBuffers
SetFilePointer
GetModuleFileNameW
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetStringTypeW
GetUserObjectSecurity
CloseDesktop
CloseWindowStation
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
SetUserObjectSecurity
EqualSid
CryptGetUserKey
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptCreateHash
CryptGetProvParam
CryptEnumProvidersW
CryptSignHashW
CryptExportKey
CryptSetHashParam
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
ReportEventW
DeregisterEventSource
RegisterEventSourceW
RevertToSelf
EnumDependentServicesA
ControlService
QueryServiceStatusEx
ImpersonateLoggedOnUser
CreateProcessAsUserA
AddAccessAllowedAce
GetSecurityDescriptorDacl
GetAclInformation
InitializeAcl
GetAce
AddAce
LogonUserA
CreateProcessWithLogonW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenSCManagerA
OpenServiceA
CreateServiceA
CloseServiceHandle
StartServiceA
GetLengthSid
CopySid
OpenProcessToken
GetTokenInformation
CryptAcquireContextA
FreeSid
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHCreateDirectoryExA
GetAdaptersInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ