C:\Users\rreapor\Documents\DevProjects\eos-2.4.3.X\Src\util\unvisible.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_1ac5a1e5794345063e0d087675e0b777_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-21_1ac5a1e5794345063e0d087675e0b777_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-21_1ac5a1e5794345063e0d087675e0b777_mafia
-
Size
327KB
-
MD5
1ac5a1e5794345063e0d087675e0b777
-
SHA1
1d3a4cf178d4100a8e850289e7aba5717cc528e6
-
SHA256
9b57ef6dc866647609bbda94c3939a1e98684e009194bb937471f40a9ca41b25
-
SHA512
2f7f319b42ee23236aba075cbb187984ee966aaafc087408faea5567971a60cf217cf41be70199a41269c5380e23c3e318806a31afd5a8c36173dadbca3ea58d
-
SSDEEP
3072:TdkNGrA2FRsXBJq3EBATk5bkqglr4Q/dNiiWrlchcjwBQ66e7Q0bVMjOla8Sdwb:WRIsRJQmbjgb/dQ2BQ66e7QFODSS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-21_1ac5a1e5794345063e0d087675e0b777_mafia
Files
-
2024-04-21_1ac5a1e5794345063e0d087675e0b777_mafia.exe windows:5 windows x86 arch:x86
3a3006e77e717d93a8ea01a930471f3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessA
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetCurrentThread
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
HeapReAlloc
HeapSize
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
SetConsoleCtrlHandler
LoadLibraryW
FreeLibrary
WriteConsoleW
SetStdHandle
CreateFileW
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ