D:\branch 3.04.64\software\AiM_EXE\32\RS3\aim\AIM_FIXERS\FirewallCheck-32-ReleaseU.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_83cf256719b815fd151e0c7d4f0581dd_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-19_83cf256719b815fd151e0c7d4f0581dd_mafia.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-19_83cf256719b815fd151e0c7d4f0581dd_mafia
-
Size
225KB
-
MD5
83cf256719b815fd151e0c7d4f0581dd
-
SHA1
8f7ac4f6d452142977b218f0d3309db94ec4ae76
-
SHA256
9731292ba984086bfc994f8f56f46a3217aaa7e1bd0665aa45e31cc0eef3beb2
-
SHA512
db0502794b3f0c2800017cc7bf8ac5028a20b5299583f6490e9601d23e638bf8b4f58c383fd62c65a0eac10a392ca82650c0e3e6a9197280e37d177ccf74ebba
-
SSDEEP
3072:yKSTYYGazwog7SIH6olYfWalw9VLLrZ2P6sUyzRAqzD3RHYYDINe:yKSTnGazwog7h+0VPYP6sRzZHYYkN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-19_83cf256719b815fd151e0c7d4f0581dd_mafia
Files
-
2024-04-19_83cf256719b815fd151e0c7d4f0581dd_mafia.exe windows:5 windows x86 arch:x86
131643b182eb0b13dcce92de728f04f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
DeleteFileW
FindFirstFileW
GetLastError
GetLongPathNameW
CompareStringW
GetProcessHeap
SetEndOfFile
WriteConsoleW
SetStdHandle
LoadLibraryW
GetModuleHandleA
GetModuleFileNameA
GetModuleHandleW
GetModuleFileNameW
SetCurrentDirectoryW
CloseHandle
GetFileTime
CreateFileW
GetCurrentDirectoryW
Sleep
CopyFileW
FindClose
FindNextFileW
GetFileInformationByHandle
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
MoveFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileExW
CreateDirectoryW
RemoveDirectoryW
GetCPInfo
HeapAlloc
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetTimeZoneInformation
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetProcAddress
HeapSize
ExitProcess
InitializeCriticalSectionAndSpinCount
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoW
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetFullPathNameW
PeekNamedPipe
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
SetEnvironmentVariableA
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
SysStringLen
SysAllocString
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ