C:\Users\swbuilder\Documents\Development\rrajabas-installers\Src\util\unvisible.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-29_70a8a9837cce1eda8e54ae806d8f81d7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-29_70a8a9837cce1eda8e54ae806d8f81d7_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-29_70a8a9837cce1eda8e54ae806d8f81d7_mafia
-
Size
327KB
-
MD5
70a8a9837cce1eda8e54ae806d8f81d7
-
SHA1
47189114eed52d369369cf83af5f3769aaec8847
-
SHA256
3ac4bbd8b4fa855888c85fcb9029f3a31e78bb1eb6e5f5f282a583912fe19ffa
-
SHA512
b5950cdd954d6d4d18ae21a18830de5eca3650677c3bbce509a9c8214cacb633c4597de2bd9a0b42da6247843c1dc0aafb07f9706dfba11d3a57b3b51e52d27d
-
SSDEEP
3072:QdktWrwm1RMXBJ63EBATk5bkqgFrbIAvdNy9WKlchcjwBg6He7Q0jWUEOlQXaKPL:ZxoMRJAmbjgbvdgCBg6He7QpOyvSM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-04-29_70a8a9837cce1eda8e54ae806d8f81d7_mafia
Files
-
2024-04-29_70a8a9837cce1eda8e54ae806d8f81d7_mafia.exe windows:5 windows x86 arch:x86
3a3006e77e717d93a8ea01a930471f3a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessA
GetStartupInfoA
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLastError
HeapFree
RaiseException
RtlUnwind
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetCurrentThread
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
HeapReAlloc
HeapSize
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
SetConsoleCtrlHandler
LoadLibraryW
FreeLibrary
WriteConsoleW
SetStdHandle
CreateFileW
Sections
.text Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ