D:\updater3.0\build-rel\build\releases\build\updaterstartuputility\vc10\outdir-Release\updaterstartuputility.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-12_8064f3dd55e3baf832767ce901ffa356_floxif_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-12_8064f3dd55e3baf832767ce901ffa356_floxif_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-12_8064f3dd55e3baf832767ce901ffa356_floxif_mafia
-
Size
1.8MB
-
MD5
8064f3dd55e3baf832767ce901ffa356
-
SHA1
3bdbe739a9c4073b18e0e9a1afc5a4f9e265f82f
-
SHA256
777b749f8368b7457daa32ef1bea0409cc30361004411302412fde849164d535
-
SHA512
8ebed6e791f83e292dd984f6e119ebb9401dd3d37c988a4634115bfbeb12c1e70fe773496b951668f5f34449b81a60d1c6c765b74b0922a377ce4e21950f98fc
-
SSDEEP
24576:xKqMmodg+eLZE6nP4+eVSTGhK1VqeIApAZf4HIpzVSf53d5X8+gW7aan/ksahWGU:xKc+eG6ndeVtwAlYX75X8+7aacsGvOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-12_8064f3dd55e3baf832767ce901ffa356_floxif_mafia
Files
-
2024-05-12_8064f3dd55e3baf832767ce901ffa356_floxif_mafia.exe windows:5 windows x86 arch:x86
482c9432efe97a1a680d7790c5d6292f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ole32
CoInitializeEx
CoTaskMemFree
CoInitialize
CoInitializeSecurity
CoUninitialize
CoCreateInstance
advapi32
FreeSid
OpenProcessToken
GetTokenInformation
EqualSid
AllocateAndInitializeSid
CheckTokenMembership
SetNamedSecurityInfoW
netapi32
NetApiBufferFree
NetWkstaUserGetInfo
kernel32
SetEndOfFile
GetProcessHeap
CompareStringW
HeapFree
SetStdHandle
WriteConsoleW
GetCurrentProcess
CloseHandle
InterlockedDecrement
TerminateThread
WaitForSingleObject
GetLocalTime
GetExitCodeThread
CreateThread
MultiByteToWideChar
LocalFree
GetCommandLineW
CreateProcessW
GetLastError
SetEnvironmentVariableA
FreeLibrary
GetProcAddress
LoadLibraryW
GetVersionExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
DeleteFileW
CreateFileW
CopyFileW
FileTimeToLocalFileTime
GetFileTime
SetFileAttributesW
CreateDirectoryW
WideCharToMultiByte
GetACP
CreateEventA
SetEvent
GetLongPathNameW
GetTempPathW
ReleaseMutex
InterlockedIncrement
CreateMutexA
InterlockedExchange
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapSetInformation
GetStartupInfoW
IsValidLocale
GetSystemTimeAsFileTime
HeapReAlloc
HeapAlloc
RtlUnwind
RaiseException
GetCPInfo
LCMapStringW
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetOEMCP
IsValidCodePage
GetLocaleInfoW
GetTimeZoneInformation
HeapSize
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
shell32
SHGetPathFromIDListW
SHGetMalloc
CommandLineToArgvW
SHGetSpecialFolderLocation
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocString
shlwapi
PathIsFileSpecW
SHGetValueW
PathFileExistsW
PathRemoveFileSpecW
Sections
.text Size: 319KB - Virtual size: 318KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE