C:\ServerBackup\remote-deploy-agent\windows\AgentDeploy\Release\AgentDeploy.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-18_84a61ba1e5a2d024ca453cea95b55cdb_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-18_84a61ba1e5a2d024ca453cea95b55cdb_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-18_84a61ba1e5a2d024ca453cea95b55cdb_mafia
-
Size
161KB
-
MD5
84a61ba1e5a2d024ca453cea95b55cdb
-
SHA1
d6f8a4561c17ec34669b9f8b4a6ab102ff37f84c
-
SHA256
75146641d65a098b3be9b789eaa24e1175d378273e3906d9861b51fb84904cc5
-
SHA512
cea7faac2d5fb84b2bfb351fa3119d7ea597d71a6d4744438e5fd7da349b22c0cf09a0c4cce263cb3e9b5f50f73b515cef842d2c92d615b4ac3b9b161cb33166
-
SSDEEP
3072:gmAuJioKgSg0vdPNWjTu68KRMK3nrU5nPOkgFkZgp0lUC2A6:gmA+HKgSg8YGPKvng5nPOlFkGC2A6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-18_84a61ba1e5a2d024ca453cea95b55cdb_mafia
Files
-
2024-02-18_84a61ba1e5a2d024ca453cea95b55cdb_mafia.exe windows:5 windows x86 arch:x86
c7e1e22f910829b80f3b60c930bd1bab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WaitForSingleObject
GetExitCodeProcess
CreateEventW
GetNativeSystemInfo
WriteFile
FormatMessageA
LocalFree
LocalAlloc
ReadFile
CreateProcessW
CloseHandle
ExpandEnvironmentStringsW
SetHandleInformation
CreatePipe
CopyFileW
FindClose
FindFirstFileW
QueueUserWorkItem
GetLastError
FlushFileBuffers
WriteConsoleW
SetStdHandle
LoadLibraryW
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
IsValidLocale
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
GetCommandLineW
HeapSetInformation
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
CreateFileW
advapi32
CloseServiceHandle
OpenServiceW
OpenSCManagerW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
DeregisterEventSource
ReportEventW
RegisterEventSourceW
QueryServiceConfigW
shell32
SHGetSpecialFolderPathW
ole32
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
SysStringLen
netapi32
NetWkstaGetInfo
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ