c:\jenkins\workspace\stub_6_9_rt\rnmininst\rel32s\extractor.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-11_429865612300afd873c6dc1bc873d5cb_karagany_mafia_magniber.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-11_429865612300afd873c6dc1bc873d5cb_karagany_mafia_magniber.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-11_429865612300afd873c6dc1bc873d5cb_karagany_mafia_magniber
-
Size
1.2MB
-
MD5
429865612300afd873c6dc1bc873d5cb
-
SHA1
2207a9ad98be2bf6dec2cb6f8dec75a86c73360b
-
SHA256
b164de8fc2379b1b2538bbc4ee0689d71f689f2b175d46204cd7826b5bafcbab
-
SHA512
5bb0e3caca6f2edbcddd61073b5b155b8d8c0409be239bd01e6370f90f0ed20c793b7b067d788d26d6c1f00683bc1f293728fd35ea2f45d565d6df8f45f8a111
-
SSDEEP
24576:ZzzWd5OB9Eo01MjPUDFoMsh35hNUfQ+nlo211630MBuGyz7GNJUQ:5Luoy8PEghNUfQ41YyGymNJUQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-11_429865612300afd873c6dc1bc873d5cb_karagany_mafia_magniber
Files
-
2024-09-11_429865612300afd873c6dc1bc873d5cb_karagany_mafia_magniber.exe windows:5 windows x86 arch:x86
e85b719038dfa8558a2a49236a357882
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathFileExistsA
user32
GetSystemMetrics
CharNextA
wsprintfA
oleaut32
VariantClear
shell32
ShellExecuteExA
kernel32
EnterCriticalSection
LeaveCriticalSection
LCMapStringW
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapCreate
HeapDestroy
HeapSize
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetProcessHeap
WriteConsoleW
CreateFileW
IsProcessorFeaturePresent
GetCurrentThreadId
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MoveFileExA
DeleteFileA
Sleep
WaitForSingleObject
WriteFile
GetTempPathA
CloseHandle
SetFilePointer
ReadFile
GetFileSize
CreateFileA
GetModuleFileNameA
GetLastError
CreateProcessA
GetProcAddress
WideCharToMultiByte
CreateRemoteThread
OutputDebugStringA
WriteProcessMemory
DuplicateHandle
GetCurrentProcess
GetModuleHandleA
VirtualAllocEx
LocalFree
MultiByteToWideChar
RaiseException
GetTickCount
GetModuleFileNameW
LoadLibraryW
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapReAlloc
GetFileType
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ