Static task
static1
Behavioral task
behavioral1
Sample
2024-11-14_d6c4530793537e06d81ed8d4025bf372_karagany_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-14_d6c4530793537e06d81ed8d4025bf372_karagany_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-14_d6c4530793537e06d81ed8d4025bf372_karagany_mafia
-
Size
2.9MB
-
MD5
d6c4530793537e06d81ed8d4025bf372
-
SHA1
749eeb5bc7456594354cd587cc614e55e637cc3d
-
SHA256
42ae60f29d5f12e14056c8a043556fb53bb1fafd33693135105d6beee3d494db
-
SHA512
577627978c642af4a38c4d10d3ee9596708178c8e936d869c8f1ede1bf6fcbdf91df82e74ba7fb3d6b3c6c2667dab87a0737d78afbec613693586185c1b0e908
-
SSDEEP
49152:otg7ETQsdSKNQ5bzPQzqhwCdxKKTUqZIt7tTt+YsaGGCj/TeDeJQxHEExLz4k8:mtdSOQ5XImaKZUga7tMFGNDtNEoJ8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-11-14_d6c4530793537e06d81ed8d4025bf372_karagany_mafia
Files
-
2024-11-14_d6c4530793537e06d81ed8d4025bf372_karagany_mafia.exe windows:5 windows x86 arch:x86
acbc8f761f4e19d096f011fd86326533
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
kernel32
RemoveDirectoryA
TlsSetValue
GetVersionExA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleFileNameW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCommandLineW
GetStartupInfoW
GetTempPathA
GetLastError
LoadLibraryExA
Sleep
CreateDirectoryA
SetStdHandle
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
GetFileType
DecodePointer
EncodePointer
SetConsoleCtrlHandler
HeapFree
GetModuleHandleW
ExitProcess
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapAlloc
DeleteFileA
FindNextFileA
GetCommandLineA
HeapSetInformation
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
SetHandleCount
GetStdHandle
DeleteCriticalSection
TlsAlloc
TlsGetValue
SetEnvironmentVariableW
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
WideCharToMultiByte
LoadLibraryW
WriteFile
GetFullPathNameA
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetFileAttributesA
MultiByteToWideChar
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringW
SetEnvironmentVariableA
HeapSize
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
LCMapStringW
WriteConsoleW
GetStringTypeW
CreateFileW
ws2_32
ntohl
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ