E:\CloudVolumes\src\cv\manager\manager-nginx\objs\nginx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-19_598cca387c7c32b381e076ab4cd8e8b5_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-19_598cca387c7c32b381e076ab4cd8e8b5_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-19_598cca387c7c32b381e076ab4cd8e8b5_mafia
-
Size
2.4MB
-
MD5
598cca387c7c32b381e076ab4cd8e8b5
-
SHA1
82676fa3464eeb79d7662bf46e905181d5109771
-
SHA256
63d83a9e7a4e16417362b0060b514a2c0e6b7f521763e502ed1b2d11f6670e83
-
SHA512
4359f80eae7b373284e593e6791b8d631cdfbf92fcbe294499f82eebbaa3d9309141e900eacb7a0a2a6ea621498b2af5f53469525f8ece6eb3114d0e38a5d23d
-
SSDEEP
49152:LzAt/A0g4+TWvloedW7pcSxp/ve2uCTwXAxkBLA:LzA5A0lvlZCcyve2uZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-19_598cca387c7c32b381e076ab4cd8e8b5_mafia
Files
-
2024-02-19_598cca387c7c32b381e076ab4cd8e8b5_mafia.exe windows:5 windows x86 arch:x86
f8a295e4c50a1326b281bd90cb2abe0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
OpenEventA
GetExitCodeProcess
WaitForMultipleObjects
GetCommandLineA
GetModuleFileNameA
CreateThread
TlsAlloc
TlsSetValue
GetEnvironmentVariableA
GetSystemInfo
GetVersionExA
SetEvent
CreateEventA
WaitForSingleObject
SetConsoleCtrlHandler
FreeConsole
ReleaseMutex
OpenMutexA
CreateMutexA
SetEnvironmentVariableA
CreateIoCompletionPort
ResetEvent
TlsGetValue
TerminateProcess
CreateProcessA
GetTimeZoneInformation
GetSystemTimeAsFileTime
SetFilePointerEx
SetEndOfFile
CreateFileMappingA
MapViewOfFile
GetFileAttributesExW
CreateFileW
GetLongPathNameW
GetDiskFreeSpaceA
FindNextFileA
FindFirstFileA
UnmapViewOfFile
SetFileTime
WriteFile
ReadFile
FormatMessageA
GetProcessHeap
GetDriveTypeW
WriteConsoleW
HeapSize
CompareStringW
SetCurrentDirectoryW
GetCurrentDirectoryW
PeekNamedPipe
GetFullPathNameA
SetFilePointer
RtlUnwind
FlushFileBuffers
GetConsoleCP
GetStartupInfoW
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidLocale
Sleep
SwitchToThread
InterlockedCompareExchange
CreateFileA
SetLastError
FindClose
GetFileInformationByHandle
GetStdHandle
InterlockedExchangeAdd
CreateDirectoryA
DeleteFileA
SetStdHandle
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
GetCurrentDirectoryA
MoveFileA
GetLastError
GetQueuedCompletionStatus
MultiByteToWideChar
GetProcAddress
GetModuleHandleA
GetVersion
GetFileType
GetTickCount
QueryPerformanceCounter
GlobalMemoryStatus
FreeLibrary
LoadLibraryA
WideCharToMultiByte
FlushConsoleInputBuffer
GetModuleHandleW
ExitProcess
DecodePointer
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetTimeFormatA
GetDateFormatA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
InterlockedExchange
EncodePointer
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FatalAppExitA
IsProcessorFeaturePresent
LoadLibraryW
GetLocaleInfoW
TlsFree
GetCurrentThread
GetModuleFileNameW
HeapCreate
HeapDestroy
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
user32
CharToOemBuffA
MessageBoxA
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
advapi32
CryptEnumProvidersA
CryptCreateHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
CryptSetHashParam
CryptSignHashA
CryptDestroyHash
CryptExportKey
CryptGetUserKey
CryptAcquireContextA
CryptGetProvParam
CryptDestroyKey
CryptReleaseContext
CryptDecrypt
ws2_32
WSAStartup
WSAIoctl
WSASend
WSAGetOverlappedResult
WSARecv
ioctlsocket
accept
connect
gethostname
WSASocketA
setsockopt
__WSAFDIsSet
closesocket
select
recv
shutdown
WSASetLastError
listen
getsockname
WSAGetLastError
getsockopt
getaddrinfo
freeaddrinfo
ntohs
htons
ntohl
htonl
bind
send
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetObjectA
BitBlt
GetBitmapBits
DeleteObject
CreateDCA
DeleteDC
GetDeviceCaps
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFindCertificateInStore
CertOpenStore
CertGetCertificateContextProperty
CertFreeCertificateContext
CertDuplicateCertificateContext
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 380KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ