Static task
static1
Behavioral task
behavioral1
Sample
pafish.exe
Resource
ubuntu1804-amd64-20231026-en
General
-
Target
pafish.exe.zip
-
Size
71KB
-
MD5
a717f88c701e98d9327e4b09e44ba1a9
-
SHA1
f6964dd1dfffe12cbc4bf9a9e50224ea10542dac
-
SHA256
6a5d20bfd6c38ccdfb56d06104a810718dc1b3f56a50e32cd8274197977f91bd
-
SHA512
d2c738db10085e7eecd9bb3e8583f5cacf9218339d68993c1ecf8b5325cbdb3b5210eff976f761939c12e73de856ea673b720b92be71ef50a417472fd20a5f8b
-
SSDEEP
1536:LJjHsaoSbJGJd2Vp3ojNHp9OeIOZrGtiLW0/0SRU9yldQZr/oUpHJL:NEKJZgJCeiVB9Emrwq5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/pafish.exe
Files
-
pafish.exe.zip.zip
-
__MACOSX/._pafish.exe
-
pafish.exe.exe windows:4 windows x86
f4ea986fa8f84cc58b776e79a3305ec2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
iphlpapi
GetAdaptersAddresses
kernel32
CloseHandle
CreateFileA
CreateProcessA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileW
DeviceIoControl
EnterCriticalSection
FreeLibrary
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentProcess
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileAttributesA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetVersionExA
GlobalMemoryStatusEx
InitializeCriticalSection
IsDBCSLeadByteEx
IsDebuggerPresent
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
Process32First
Process32Next
SetConsoleTextAttribute
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
lstrcmpiA
mpr
WNetGetProviderNameA
msvcrt
__getmainargs
__initenv
__lconv_init
__mb_cur_max
__p__acmdln
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_errno
_initterm
_iob
_lock
_onexit
_unlock
abort
atoi
calloc
exit
fclose
fopen
fprintf
fputc
fputs
free
fwrite
getchar
localeconv
malloc
mbstowcs
memcmp
memcpy
memset
rand
setlocale
signal
srand
strchr
strerror
strlen
strncat
strncmp
strncpy
strstr
toupper
vfprintf
wcslen
wcsstr
ole32
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
SysAllocString
SysFreeString
shell32
ShellExecuteExW
user32
CallNextHookEx
CreateWindowExW
DefWindowProcW
DestroyWindow
DispatchMessageA
FindWindowA
GetClientRect
GetCursorPos
GetDoubleClickTime
GetMessageA
GetSysColorBrush
GetSystemMetrics
GetWindowRect
KillTimer
LoadCursorA
MessageBeep
PostMessageA
PostQuitMessage
RegisterClassW
SetTimer
SetWindowsHookExA
ShowWindow
TranslateMessage
UnhookWindowsHookEx
ws2_32
freeaddrinfo
getaddrinfo
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE