E:\cplusplus_workspace\LinkuX264Encoder_win\trunk\libx264\Debug\LinkuX264_dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_400cd4ed3ee02697a3dff8c1772cd9af_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-10_400cd4ed3ee02697a3dff8c1772cd9af_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-10_400cd4ed3ee02697a3dff8c1772cd9af_mafia
-
Size
888KB
-
MD5
400cd4ed3ee02697a3dff8c1772cd9af
-
SHA1
08709af924ddd6a0747bfdeedd20ba8336ad56f9
-
SHA256
0ef6e40ceca92bfbd00f086f555da579af9dce18e8b7bbc672de9540bfeab52b
-
SHA512
f34b7f42c3f15ee5d88257fb3165f8be3df13c2deb7bad36011e778164cbed91eb3f1f316299b9dad3c6f6ea5f1a87f13ab568a3192d2cfa00ad17c357c9d816
-
SSDEEP
24576:DW39MYSnMU8A2nrn1/8uDObpOg3UB4y3dwcSsRb:DOEMU8PDObsg3UB45cSsRb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-10_400cd4ed3ee02697a3dff8c1772cd9af_mafia
Files
-
2024-05-10_400cd4ed3ee02697a3dff8c1772cd9af_mafia.exe windows:5 windows x86 arch:x86
fff8fef770e8a0eb4417bf0febfe32d4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
RtlUnwind
DecodePointer
EncodePointer
GetCommandLineA
HeapSetInformation
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
ReadFile
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
MoveFileA
RaiseException
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WriteFile
GetLocaleInfoW
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoW
DeleteCriticalSection
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
FatalAppExitA
CloseHandle
SetFilePointer
SetConsoleCtrlHandler
FreeLibrary
GetProcessHeap
VirtualQuery
HeapSize
SetStdHandle
FlushFileBuffers
CreateFileA
InterlockedExchange
LCMapStringW
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
CreateFileW
SetEndOfFile
DeleteFileA
Exports
Exports
DestroyH264EncoderInstance
GetH264EncoderInstance
Sections
.textbss Size: - Virtual size: 356KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 734KB - Virtual size: 734KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ