C:\b\build\slave\Win\build\src\build\Release\app_host.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-14_db5bc6e3d8a49e8c7040d5329b736d10_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-14_db5bc6e3d8a49e8c7040d5329b736d10_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-14_db5bc6e3d8a49e8c7040d5329b736d10_mafia
-
Size
250KB
-
MD5
db5bc6e3d8a49e8c7040d5329b736d10
-
SHA1
5381151c244e9509f261e1418cbf0646f473db74
-
SHA256
df295a969f0ba4e271111eefaafd57f776fb58f2c172159b8a68900ddd27d676
-
SHA512
016bea5fb8153de1086d14e894e1bcf545aa8daaa6a804df80c443e4d1647a451c82aada5f37a27a34638c5f7c0d9dd11f1426ed7b78fb52ddace1e711342423
-
SSDEEP
3072:+ble8e3LBheNNVBJDFDOWEwAx9KR9DJrUn8O/l1e2Gsppnqa6O:+blNkHeNbJytwAjKR9DJQnr91xGn0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-14_db5bc6e3d8a49e8c7040d5329b736d10_mafia
Files
-
2024-02-14_db5bc6e3d8a49e8c7040d5329b736d10_mafia.exe windows:5 windows x86 arch:x86
286996f66c4d6908e8a62bea2b93a605
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
CoTaskMemFree
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
winmm
timeGetTime
kernel32
CloseHandle
WaitForSingleObject
ReleaseMutex
GetLastError
SetLastError
CreateProcessW
GetModuleFileNameW
CreateMutexW
SetFilePointer
CreateFileW
WriteFile
OutputDebugStringA
RaiseException
GetCurrentThreadId
Sleep
IsDebuggerPresent
GetUserDefaultLangID
ExpandEnvironmentStringsW
InterlockedCompareExchange
LocalFree
GetCommandLineW
GetCurrentProcess
HeapSetInformation
GetProcAddress
GetModuleHandleW
TerminateProcess
ResumeThread
AssignProcessToJobObject
GetStdHandle
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetNativeSystemInfo
GetVersionExW
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
InterlockedExchangeAdd
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
InterlockedIncrement
InterlockedExchange
WideCharToMultiByte
InterlockedDecrement
MultiByteToWideChar
InitializeCriticalSection
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
HeapAlloc
GetCPInfo
RtlUnwind
LCMapStringW
HeapCreate
IsProcessorFeaturePresent
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetTimeZoneInformation
WriteConsoleW
SetStdHandle
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoW
FreeLibrary
LoadLibraryW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CompareStringW
SetEnvironmentVariableA
GetFileAttributesW
LoadLibraryA
LocalAlloc
GetCurrentProcessId
GetTempPathW
GetCurrentDirectoryW
GetSystemDirectoryW
GetWindowsDirectoryW
ExitProcess
user32
MessageBoxW
advapi32
CreateProcessAsUserW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ