C:\Projects\NEMESIS\nemesis-gemina\nemesis\bin\carriers\ezlzma_x86_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_5ad63888e1ee26230f405ee5078c82e6_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_5ad63888e1ee26230f405ee5078c82e6_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_5ad63888e1ee26230f405ee5078c82e6_mafia
-
Size
1.5MB
-
MD5
5ad63888e1ee26230f405ee5078c82e6
-
SHA1
84d16ef4139d40ac4393fe77f142f3e568424300
-
SHA256
6c0673026af2d8a9b29fa3884d32d40466d99fae23e87961f0a60ad7b56bf216
-
SHA512
74a82f6befbd0af301f7feac8aa87777742aac2a6830bcd1a5a9796487b8cdcbffbd4e803d402e6d3bc2bde254252dce7b375cd0804e89a8e42fae56c5f35418
-
SSDEEP
3072:+6LC+FNu6RzLI3Kc70WYEn2/rQ2uEXDJOxviwYS1ASspHrGu6xHDYpegNvjyG4:fLpFNu6RzYT0m2qCDJ6tYS1AZ6Cphvm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_5ad63888e1ee26230f405ee5078c82e6_mafia
Files
-
2024-03-13_5ad63888e1ee26230f405ee5078c82e6_mafia.exe windows:5 windows x86 arch:x86
3878370365af097ca76422ab275e9044
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SystemTimeToFileTime
GetModuleHandleW
Sleep
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
GetSystemTime
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
MultiByteToWideChar
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapSize
EnterCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
GetLastError
HeapReAlloc
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
IsValidLocale
user32
EndPaint
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadStringA
LoadIconA
BeginPaint
TranslateMessage
TranslateAcceleratorA
EndDialog
DefWindowProcA
LoadAcceleratorsA
DispatchMessageA
LoadCursorA
DialogBoxParamA
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 516KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ