D:\TxProject\PCBzProjects\COpenFileManager\Release\COpenFileManager.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-20_13df74fba6fb80d599bb09ff57099d70_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-20_13df74fba6fb80d599bb09ff57099d70_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-20_13df74fba6fb80d599bb09ff57099d70_mafia
-
Size
237KB
-
MD5
13df74fba6fb80d599bb09ff57099d70
-
SHA1
dde720633fb00734e2f9468462f95408ce7f7ea0
-
SHA256
44b877963b36d26e4a864ae31c72e5f53616d919d0ab841a7339f96a67731743
-
SHA512
b648bf1c1c73c30045c13ba737048a4a03f8776a4977c97a108f0030cf7c64bebf4ef2a6f64ef7d9a95d48303f63ba2326de1cb01391b00be4ec0865ad63b97b
-
SSDEEP
6144:ynwfIp9nEC6nCiiTpZh8DS2Wc0Sa7fRGGnz:qwgvElMh8Dfta7fRGGn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-20_13df74fba6fb80d599bb09ff57099d70_mafia
Files
-
2024-02-20_13df74fba6fb80d599bb09ff57099d70_mafia.exe windows:5 windows x86 arch:x86
57d4f48835aec072d977b2b453078e65
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
inet_ntoa
WSACleanup
connect
WSAStartup
select
htons
recv
socket
__WSAFDIsSet
closesocket
gethostbyname
send
getsockopt
inet_addr
user32
GetSystemMetrics
PostMessageW
netapi32
Netbios
kernel32
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetStdHandle
HeapCreate
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
WriteConsoleW
SetLastError
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
SetFilePointer
WriteFile
ReadFile
CreateFileW
GetLastError
CloseHandle
Sleep
CreateThread
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FlushFileBuffers
FindResourceA
FreeLibrary
LoadResource
UpdateResourceA
EndUpdateResourceW
EnumResourceTypesA
SizeofResource
EnumResourceLanguagesA
BeginUpdateResourceW
LoadLibraryA
LockResource
BeginUpdateResourceA
UpdateResourceW
EnumResourceNamesA
EndUpdateResourceA
WideCharToMultiByte
MultiByteToWideChar
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GetModuleHandleW
LoadLibraryW
GetVersionExW
TerminateProcess
GetProcAddress
GetSystemInfo
GetCommandLineA
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
GetCommandLineW
HeapSetInformation
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
Sections
.text Size: 175KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ