G:\project\work\20230810\Mist\Release\IFirstExe.pdb
General
-
Target
2024-04-27_d7564787533c364bb5b0f6f70f4ee770_mafia
-
Size
179KB
-
MD5
d7564787533c364bb5b0f6f70f4ee770
-
SHA1
106b07f1192bd782071bf3786ea7bc3ae416675d
-
SHA256
c62d84a0f48eb322e0ba7f6aac4cbad47324e66d014fb503a06ec1e78937fba8
-
SHA512
c68511eed99e6d8645e4c5121c5f281ca435c142e8bc88c4664044c8432a873be22c3730a57d9db7d1e68df7a071c8c52ce6b324a00e40dcee90441f1d4a9d10
-
SSDEEP
1536:dfQFlcjpEw8wf8zjoT6iLoZGkNdcyLfcBgjrdYn8Q+d1AnKteqEmbaLA67sztDd5:dm6lDrf8zjoWUoZGkWARAnJq41szrpZ
Malware Config
Signatures
Files
-
2024-04-27_d7564787533c364bb5b0f6f70f4ee770_mafia.exe windows:5 windows x86 arch:x86
193086b1023fd798af73f2b2002b8ba8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wtsapi32
WTSQueryUserToken
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
kernel32
GetProcAddress
WaitForSingleObject
GetSystemDirectoryW
GetStartupInfoW
CreateProcessW
GetVersionExA
GetCurrentProcess
ProcessIdToSessionId
GetCurrentProcessId
CreateThread
Sleep
ExitProcess
SetErrorMode
LoadLibraryA
GetExitCodeThread
CreatePipe
FlushFileBuffers
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
ExpandEnvironmentStringsW
GetDriveTypeW
GetVolumeInformationW
GetDiskFreeSpaceExW
GetLogicalDrives
FindFirstFileW
FindNextFileW
FindClose
GetComputerNameW
GetSystemInfo
GlobalMemoryStatusEx
OpenEventA
CreateEventA
OpenMutexA
CreateMutexA
SetEvent
DeleteFileW
RemoveDirectoryW
InterlockedExchange
LoadLibraryW
EncodePointer
DecodePointer
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
HeapSetInformation
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
RaiseException
HeapFree
HeapSize
GetModuleHandleW
IsProcessorFeaturePresent
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
LCMapStringW
RtlUnwind
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
WriteConsoleW
SetStdHandle
WideCharToMultiByte
MultiByteToWideChar
WriteFile
ReadFile
SetFilePointer
GetFileAttributesW
CreateFileW
GetFileSize
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetLastError
WTSGetActiveConsoleSessionId
CloseHandle
user32
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
advapi32
DuplicateTokenEx
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
ImpersonateLoggedOnUser
RevertToSelf
CreateProcessAsUserW
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
GetUserNameA
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ