G:\MyProjects\FF\FClient\Release\FClient.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_4e1c8ae4931314fa13171d2305c5ba3e_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_4e1c8ae4931314fa13171d2305c5ba3e_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_4e1c8ae4931314fa13171d2305c5ba3e_mafia
-
Size
2.5MB
-
MD5
4e1c8ae4931314fa13171d2305c5ba3e
-
SHA1
680bd6a206cbf8eefe7b99cffefbc509374f750b
-
SHA256
31693993d654cf6b2ef446e612e38335b1828f471367270456f1deb8501177f5
-
SHA512
086391c7098fd1f57b2f4227167dfb57e81549ce19129d8ff0c9d1b4cd76deb259c1d97cbf4060906b8068f7da04b602fe3bda6fe03f53990452c499c5e4df6e
-
SSDEEP
49152:EB6Ok20hMPWtPcMeOIQeXBL0h+TZVBJ/rxW+5i:E8paWtPcMeOIXBC+TZdjxW+5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-28_4e1c8ae4931314fa13171d2305c5ba3e_mafia
Files
-
2024-01-28_4e1c8ae4931314fa13171d2305c5ba3e_mafia.exe windows:5 windows x86 arch:x86
05ad2c56615d9c552af2fc531b9a9a4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
CloseHandle
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
OpenMutexW
CreateMutexW
SetUnhandledExceptionFilter
FileTimeToSystemTime
SystemTimeToFileTime
SetEndOfFile
WriteConsoleW
CreateFileW
FlushFileBuffers
SetStdHandle
IsValidLocale
EnumSystemLocalesA
LeaveCriticalSection
GetUserDefaultLCID
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoW
GetModuleFileNameW
GetStdHandle
DeleteCriticalSection
HeapCreate
ExitProcess
HeapSize
SetLastError
GetLocaleInfoA
EnterCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
ReadFile
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
CompareStringW
GetCPInfo
LCMapStringW
HeapAlloc
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineW
CreateThread
ExitThread
HeapReAlloc
HeapFree
GetProcessHeap
LoadLibraryW
GetProcAddress
InitializeCriticalSection
GetTickCount
GetLocalTime
WriteFile
Sleep
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
FreeLibrary
GetLastError
user32
OffsetRect
SetCursorPos
GetCursorPos
LoadStringW
PeekMessageW
TranslateMessage
GetAsyncKeyState
ShowCursor
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassExW
MessageBoxA
ClientToScreen
CreateWindowExW
ShowWindow
UpdateWindow
PostQuitMessage
DefWindowProcW
SetWindowTextW
SetWindowPos
wsprintfW
GetKeyState
FlashWindow
GetClientRect
GetSystemMetrics
shell32
ShellExecuteW
iphlpapi
GetAdaptersInfo
ws2_32
socket
WSAEventSelect
WSAWaitForMultipleEvents
WSAEnumNetworkEvents
WSAResetEvent
recv
inet_ntoa
send
WSAGetLastError
WSASetEvent
shutdown
closesocket
WSAStartup
WSACreateEvent
gethostbyname
inet_addr
htons
connect
dbghelp
MiniDumpWriteDump
d3d9
Direct3DCreate9
d3dx9_42
D3DXCreateSprite
D3DXCreateLine
D3DXCreateTextureFromFileExW
D3DXMatrixAffineTransformation2D
D3DXCompileShader
D3DXCreateTextureFromFileInMemoryEx
bass
BASS_ChannelStop
BASS_ChannelPlay
BASS_ChannelSetAttribute
BASS_StreamCreateFile
BASS_Init
BASS_GetVersion
BASS_StreamFree
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ