C:\AIM-SW\TRUNK\software\AiM_EXE\32\RS3\aim\AIM_FIXERS\FirewallCheck-32-ReleaseU.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_6ad4e67ec533c0fc90c3cb0e90bb7f3f_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-07_6ad4e67ec533c0fc90c3cb0e90bb7f3f_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_6ad4e67ec533c0fc90c3cb0e90bb7f3f_mafia
-
Size
227KB
-
MD5
6ad4e67ec533c0fc90c3cb0e90bb7f3f
-
SHA1
c28057aef716dea3d92fc1cfb96a0140f1948be4
-
SHA256
b4e76f8501fd1a567ccac35c367107ded88879cb5f4bdf2b286e90076b02c1de
-
SHA512
c605bdc9b81e793449d0d179b555c62366b400d0ada158822b42accc0e8e01b219b63c4cb2d19ebd351ec8d993d4779bddccc5b957d258c340bcd499df594397
-
SSDEEP
3072:JdAjsWM9jhRQsyfE9p47vmNBaTW1B4G9c1CwFb7qzD3khpKjT:JdAjsh9jhRQsyfE9a+1BFe1CwFjm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-07_6ad4e67ec533c0fc90c3cb0e90bb7f3f_mafia
Files
-
2024-03-07_6ad4e67ec533c0fc90c3cb0e90bb7f3f_mafia.exe windows:5 windows x86 arch:x86
133fe81bbaafca178eeb181752a88eb3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileW
FindFirstFileW
GetLastError
GetLongPathNameW
CompareStringW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
LoadLibraryW
GetModuleHandleA
GetModuleFileNameA
GetModuleHandleW
GetModuleFileNameW
SetCurrentDirectoryW
GetFileAttributesW
CloseHandle
GetFileTime
CreateFileW
SetFileAttributesW
GetFileInformationByHandle
GetCurrentDirectoryW
Sleep
CopyFileW
FindClose
FindNextFileW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
MoveFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
CreateDirectoryW
RemoveDirectoryW
GetCPInfo
HeapAlloc
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetTimeZoneInformation
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetProcAddress
HeapSize
ExitProcess
InitializeCriticalSectionAndSpinCount
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetFullPathNameW
PeekNamedPipe
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetEnvironmentVariableA
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
SysStringLen
SysAllocString
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ