z:\nginx\nginx\objs.msvc8\nginx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_07ec52391722f1ae3a91f64d966fb4e7_floxif_mafia_qakbot_revil.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-07_07ec52391722f1ae3a91f64d966fb4e7_floxif_mafia_qakbot_revil.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-07_07ec52391722f1ae3a91f64d966fb4e7_floxif_mafia_qakbot_revil
-
Size
3.6MB
-
MD5
07ec52391722f1ae3a91f64d966fb4e7
-
SHA1
d34e37dcae73f7ee5ee91762f390aa097f409260
-
SHA256
53e4f5dcb8f26234885da7afb485385e79a0290221f90177543686d84d5fe951
-
SHA512
56351db22bd93ac98b186035e47e0611824e672afc971af435c0ed084ea53decaadb3aeb86bc9bddd112874fd8828c422cd7454a5933fe998287a9c34311b0ec
-
SSDEEP
49152:qcYyj9pA59uV422X8rvpWpQLuNOuCAzw1qXQAU91pdvNTdUu0Oepg:qJ+i9uV/o6pGw0UfvT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-07_07ec52391722f1ae3a91f64d966fb4e7_floxif_mafia_qakbot_revil
Files
-
2024-05-07_07ec52391722f1ae3a91f64d966fb4e7_floxif_mafia_qakbot_revil.exe windows:5 windows x86 arch:x86
d6eac48abe55092eb3750c31c2b4bb08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateFileW
GetFileAttributesExW
MapViewOfFile
CreateFileMappingA
SetEndOfFile
SetFilePointerEx
MapViewOfFileEx
GetSystemTimeAsFileTime
GetTimeZoneInformation
CreateProcessA
TerminateProcess
ResetEvent
OpenEventA
GetExitCodeProcess
WaitForMultipleObjects
GetCommandLineA
GetModuleFileNameA
CreateThread
GetEnvironmentVariableA
GetModuleHandleA
GetSystemInfo
GetVersionExA
SetEvent
CreateEventA
WaitForSingleObject
GetLongPathNameW
FreeConsole
ReleaseMutex
OpenMutexA
CreateMutexA
SetEnvironmentVariableA
CreateIoCompletionPort
GetQueuedCompletionStatus
RemoveDirectoryA
GetDiskFreeSpaceA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
SetFileTime
WriteFile
ReadFile
FormatMessageA
Sleep
SwitchToThread
InterlockedCompareExchange
CreateFileA
SetLastError
GetFileInformationByHandle
CreateDirectoryA
DeleteFileA
SetStdHandle
GetCurrentThreadId
InterlockedExchangeAdd
LoadLibraryA
GetProcAddress
GetProcessHeap
GetDriveTypeW
WriteConsoleW
CompareStringW
RtlUnwind
HeapSize
SetCurrentDirectoryW
GetCurrentDirectoryW
PeekNamedPipe
GetFullPathNameA
SetFilePointer
FlushFileBuffers
GetConsoleCP
GetTickCount
GetStartupInfoW
SetHandleCount
MoveFileA
GetCurrentProcessId
CloseHandle
FreeLibrary
GetCurrentDirectoryA
GetLastError
SetConsoleCtrlHandler
GetStdHandle
SystemTimeToFileTime
GetSystemTime
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
DeleteFiber
SwitchToFiber
CreateFiber
WideCharToMultiByte
FindNextFileW
FindFirstFileW
MultiByteToWideChar
GetModuleHandleExW
GetModuleHandleW
GetVersion
GetFileType
FormatMessageW
QueryPerformanceCounter
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
GetEnvironmentVariableW
HeapFree
ExitProcess
DecodePointer
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetTimeFormatA
GetDateFormatA
HeapSetInformation
InterlockedExchange
HeapReAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
EncodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
FatalAppExitA
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetLocaleInfoW
GetCurrentThread
GetModuleFileNameW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
GetProcessWindowStation
MessageBoxW
CharToOemBuffA
GetUserObjectInformationW
advapi32
CryptGetProvParam
CryptCreateHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegSetValueExA
ReportEventW
RegisterEventSourceW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
CryptEnumProvidersW
CryptDestroyKey
CryptDecrypt
CryptGetUserKey
CryptExportKey
CryptDestroyHash
CryptSignHashW
CryptSetHashParam
RegCreateKeyExA
ws2_32
__WSAFDIsSet
WSAStartup
WSAIoctl
WSASend
WSAGetOverlappedResult
WSARecv
ioctlsocket
accept
connect
gethostname
WSASocketW
select
recv
shutdown
setsockopt
bind
closesocket
listen
getsockname
WSAGetLastError
getsockopt
getaddrinfo
freeaddrinfo
htons
ntohs
ntohl
htonl
WSASetLastError
send
getnameinfo
gethostbyname
WSACleanup
socket
crypt32
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertFreeCertificateContext
CertDuplicateCertificateContext
Sections
.text Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 642KB - Virtual size: 641KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ