E:\PCProjects\Pakages\Pakage1.0\AICONExe\Release\AICONExe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_8792e1b7d20436ab80bb3f98da40e27d_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_8792e1b7d20436ab80bb3f98da40e27d_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-16_8792e1b7d20436ab80bb3f98da40e27d_mafia
-
Size
293KB
-
MD5
8792e1b7d20436ab80bb3f98da40e27d
-
SHA1
fc22a7be5fbde6facbf8272a328bd1aec7a14889
-
SHA256
28d8d38f9f4059f8b1d306170598a73aefc2235c2026bff877f09fca78464070
-
SHA512
c9336f5ca15c249d17473efcdc6642c8e8e490c5233249e0e8b69323b9dc277828b9a87a8975ea62e16320526c6cb284e817544f5f3ff81816b7a1e175f7c6a8
-
SSDEEP
6144:YNgF4DxNuJc06j4YBa77xMQxA5i5knmv1SL/mQXAelPEYrnqSt:Yu4lNAtYytvS5Aku1YLAcprnqS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-16_8792e1b7d20436ab80bb3f98da40e27d_mafia
Files
-
2024-04-16_8792e1b7d20436ab80bb3f98da40e27d_mafia.exe windows:5 windows x86 arch:x86
1c987a054a75dee2dd9dc04e22456d2f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetSystemMetrics
PostMessageW
advapi32
RegOpenKeyW
RegCloseKey
RegEnumValueA
RegOpenKeyExA
shell32
ShellExecuteA
ws2_32
getsockopt
socket
gethostbyname
closesocket
__WSAFDIsSet
recv
htons
select
WSAStartup
connect
inet_ntoa
send
netapi32
Netbios
kernel32
CompareStringW
SetEnvironmentVariableA
GetModuleHandleW
WriteConsoleW
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetLocaleInfoW
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetStdHandle
GetTimeZoneInformation
IsValidCodePage
GetOEMCP
GetACP
HeapSize
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcessId
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetFilePointer
WriteFile
ReadFile
CreateFileW
GetLastError
CloseHandle
Sleep
CreateThread
GetCommandLineA
CreateMutexW
WaitForSingleObject
ReleaseMutex
FindResourceA
FreeLibrary
LoadResource
UpdateResourceA
EndUpdateResourceW
EnumResourceTypesA
SizeofResource
EnumResourceLanguagesA
SetLastError
BeginUpdateResourceW
LoadLibraryA
LockResource
BeginUpdateResourceA
UpdateResourceW
EnumResourceNamesA
EndUpdateResourceA
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
LoadLibraryW
GetVersionExW
GetFileAttributesA
TerminateProcess
GetProcAddress
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
GetCommandLineW
HeapSetInformation
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
Sections
.text Size: 185KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ