C:\Projects\NEMESIS\nemesis-gemina\nemesis\bin\carriers\ezlzma_x86_exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_a608b6524509cd38e7f63aae14102e7e_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_a608b6524509cd38e7f63aae14102e7e_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_a608b6524509cd38e7f63aae14102e7e_mafia
-
Size
1.5MB
-
MD5
a608b6524509cd38e7f63aae14102e7e
-
SHA1
e34f4165c85347d7bd3f70b0506979805bc7de4e
-
SHA256
47a035d4718de0eb275ca2ecc4ddd728f4d99514758e538b802de6f8b25679ba
-
SHA512
137a723d1aa4cbf075e3a86afde6db3e7db00e1e418b0de7353b201ca809a1f9ab6aa68c92b88c7e26dd1c8699444edb70f927aea373e7de86d71cd24fbc16d8
-
SSDEEP
3072:+6LC+FNu6RzLI3Kc70WYEn2/rQ2uEXDJOxviwYS1ASspHrGu6xHDYpegNfjyG4:fLpFNu6RzYT0m2qCDJ6tYS1AZ6Cphfm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_a608b6524509cd38e7f63aae14102e7e_mafia
Files
-
2024-03-13_a608b6524509cd38e7f63aae14102e7e_mafia.exe windows:5 windows x86 arch:x86
3878370365af097ca76422ab275e9044
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
SystemTimeToFileTime
GetModuleHandleW
Sleep
GetProcAddress
VirtualAlloc
LoadLibraryA
VirtualProtect
GetSystemTime
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
MultiByteToWideChar
LCMapStringW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
SetConsoleCtrlHandler
HeapSize
EnterCriticalSection
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
GetLastError
HeapReAlloc
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
EncodePointer
DecodePointer
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
IsValidLocale
user32
EndPaint
DestroyWindow
GetMessageA
RegisterClassExA
PostQuitMessage
LoadStringA
LoadIconA
BeginPaint
TranslateMessage
TranslateAcceleratorA
EndDialog
DefWindowProcA
LoadAcceleratorsA
DispatchMessageA
LoadCursorA
DialogBoxParamA
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 516KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ