c:\Users\build\workspace\k2-3.6-win\src\klone\ReleaseStatic\Win32\kloned.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_829d814b6a6f551032729fdf133050b0_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_829d814b6a6f551032729fdf133050b0_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_829d814b6a6f551032729fdf133050b0_mafia
-
Size
241KB
-
MD5
829d814b6a6f551032729fdf133050b0
-
SHA1
c45985badfff25d327af799e5466488aabd57d5c
-
SHA256
617c5dd056a7759de1dc94defab6a5c58c6750e59fe8b95cf656174f4402c9b6
-
SHA512
2260e03284b23808fbd41c73a5646b300bb41a95b55636d9533618938b0f2ba5369eb0f4451c238a4b73bf3c94494d0340b4d7ce397eadea2ac3a38563ce7d37
-
SSDEEP
3072:RVms00cqDUoDjY2xpWkjLJ0Z1QMrXnSoa4uUjWdvwtHyLxyjj+PIh8:Hms00cqzdMknJLMrXjGUydvwtSMj268
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-11_829d814b6a6f551032729fdf133050b0_mafia
Files
-
2024-04-11_829d814b6a6f551032729fdf133050b0_mafia.exe windows:5 windows x86 arch:x86
69fa7470e6665fa061cbb035e5713abc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ntohl
htonl
connect
inet_ntoa
WSAStartup
WSAGetLastError
htons
ntohs
setsockopt
recv
bind
socket
closesocket
gethostbyname
send
listen
accept
kernel32
GetDateFormatA
SetEnvironmentVariableA
CompareStringW
SetStdHandle
SetFilePointer
WriteConsoleW
IsValidLocale
EnumSystemLocalesA
GetFullPathNameW
FindFirstFileW
GetCurrentProcess
CreateDirectoryW
SetFileTime
WideCharToMultiByte
SetFileShortNameW
FormatMessageW
GetFileAttributesW
CreateFileW
MultiByteToWideChar
GetLastError
GetLongPathNameW
FindClose
CreateHardLinkW
RemoveDirectoryW
CloseHandle
DeleteFileW
GetFileInformationByHandle
LocalFree
SetFileAttributesW
LCMapStringW
SetFilePointerEx
WriteFile
ReadFile
GetFileSizeEx
DeviceIoControl
FindNextFileW
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
HeapFree
HeapAlloc
GetTimeFormatA
HeapReAlloc
GetSystemTimeAsFileTime
RaiseException
GetCPInfo
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetTimeZoneInformation
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
advapi32
SetKernelObjectSecurity
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertStringSecurityDescriptorToSecurityDescriptorA
OpenProcessToken
ConvertSecurityDescriptorToStringSecurityDescriptorA
GetKernelObjectSecurity
Sections
.text Size: 186KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ