Static task
static1
Behavioral task
behavioral1
Sample
2024-11-05_5a9cba5f1ad4c9071a5ac12d57521f78_karagany_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-05_5a9cba5f1ad4c9071a5ac12d57521f78_karagany_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-05_5a9cba5f1ad4c9071a5ac12d57521f78_karagany_mafia
-
Size
249KB
-
MD5
5a9cba5f1ad4c9071a5ac12d57521f78
-
SHA1
3cd2e54f670ae1f11b62524bd0f80c03a200a91d
-
SHA256
12541b95bc5c22ed3e55ebf6583b8fff5c7d236848a04dc1bf343d435b86d3cc
-
SHA512
79ba22ae677edf34d452065c5e8669061805bd06637514871e76a8ceb91f734fdc4ea075d0111cd17a0a9ba1d5935bbbc6c3aedf057e5f2f442fcbd228aaf604
-
SSDEEP
3072:07o3l1Ku4QB9P1ni2BN9/Bxo9Okep2jCPmJmWvQWAyUVTrJbRzxTjoiDYqY:07YQQjtn138UketPeZA/pDYP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-05_5a9cba5f1ad4c9071a5ac12d57521f78_karagany_mafia
Files
-
2024-11-05_5a9cba5f1ad4c9071a5ac12d57521f78_karagany_mafia.exe windows:5 windows x86 arch:x86
ddccaea0e0581b019e9186db77affdda
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
GetThreadSelectorEntry
GetMailslotInfo
ExitThread
FillConsoleOutputCharacterW
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetProcessVersion
AddAtomW
GlobalAlloc
GetProcessShutdownParameters
VirtualProtect
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetSystemTimeAsFileTime
GetTickCount
FindAtomA
GetNativeSystemInfo
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
HeapReAlloc
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetModuleFileNameA
FreeEnvironmentStringsW
GetStringTypeW
user32
EndPaint
SendDlgItemMessageA
GetRegisteredRawInputDevices
GetAltTabInfoA
GetAltTabInfoW
GetRawInputDeviceInfoW
RegisterRawInputDevices
GetNextDlgGroupItem
shell32
DragQueryFileW
ShellAboutW
FindExecutableA
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 139KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ