C:\cygwin\home\James\amrivox\PC-apps\VoiceConnect\MainInstaller\Release\RunWrapper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_4f114d3e646e0e0ea87c982716c7bd5f_karagany_mafia_sakula.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-12_4f114d3e646e0e0ea87c982716c7bd5f_karagany_mafia_sakula.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_4f114d3e646e0e0ea87c982716c7bd5f_karagany_mafia_sakula
-
Size
21.1MB
-
MD5
4f114d3e646e0e0ea87c982716c7bd5f
-
SHA1
80d37e3acd70fab899063a2b2d24bf5511245433
-
SHA256
6231651e2240293c8b6bb9111475402e04958d68930c730d24e98767bc45da53
-
SHA512
3ab8e82ef17b01ae2cd1c00f9274093d0d229dc04e2495882195984456052b674cc3b817e873c6e7c0a0b2d77572f35e7ba78741751ff936a3e664d1f0f94246
-
SSDEEP
393216:RdTPKZNfEC+EC4+nqWigbP1NpakElZ+PrVIsusmfbm2rsYly3mjAz:RdmNJ1Wp7BmlZ+/usKbm9S7jA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-10-12_4f114d3e646e0e0ea87c982716c7bd5f_karagany_mafia_sakula
Files
-
2024-10-12_4f114d3e646e0e0ea87c982716c7bd5f_karagany_mafia_sakula.exe windows:5 windows x86 arch:x86
cf0eba26e02641e17e14aa641320a9c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
kernel32
FreeResource
FindResourceW
LoadResource
CreateDirectoryW
OpenProcess
Sleep
SizeofResource
HeapSize
GetTempPathW
GetLastError
LockResource
CloseHandle
HeapReAlloc
CompareStringW
SetEnvironmentVariableW
GetFileAttributesW
GetFullPathNameW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
EncodePointer
DecodePointer
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
SetEnvironmentVariableA
GetFileInformationByHandle
PeekNamedPipe
GetFileType
CreateFileW
HeapFree
GetCurrentDirectoryW
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
MultiByteToWideChar
LCMapStringW
GetStringTypeW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
SetStdHandle
SetEndOfFile
HeapAlloc
GetProcessHeap
ReadFile
GetTimeZoneInformation
WriteConsoleW
FlushFileBuffers
IsProcessorFeaturePresent
LoadLibraryW
user32
MessageBoxW
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21.0MB - Virtual size: 21.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ