W:\Boinc-dev\boinc\win_build\Build\Win32\Release\worker_6.1_windows_intelx86.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-27_e1328abb95952a5a7ce17e2ccdc4e8b5_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-27_e1328abb95952a5a7ce17e2ccdc4e8b5_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-27_e1328abb95952a5a7ce17e2ccdc4e8b5_mafia
-
Size
909KB
-
MD5
e1328abb95952a5a7ce17e2ccdc4e8b5
-
SHA1
816e0e1db6b287136d2566bfac7a19b088b70ace
-
SHA256
fea46e8cf11af31fe34f55c325764b1a90cef34ba820b7479078baee85475496
-
SHA512
2fae37e2d3fa0e567ef08032278d5359868434f925f03d332885cd7053264aa458b176d4491fad2205667607638b94bc10b161b9d00b1268e972410ea82e1627
-
SSDEEP
12288:8op+j/Vdv7niOlvpd8qzBOhpyDe6IkyWAQ+YTr2uiy9DMZEeZy73jVfUIRBV:EVd2uGyqksQ+YuoM9w7RfUuBV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-27_e1328abb95952a5a7ce17e2ccdc4e8b5_mafia
Files
-
2024-05-27_e1328abb95952a5a7ce17e2ccdc4e8b5_mafia.exe windows:5 windows x86 arch:x86
0f17bd7cbb1fd70cdd19694fecf16651
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
GetCommandLineA
HeapSetInformation
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
SetFilePointer
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
GetModuleFileNameW
HeapCreate
HeapDestroy
Sleep
ReadFile
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteConsoleW
MultiByteToWideChar
SetStdHandle
HeapSize
HeapReAlloc
CreateFileA
LCMapStringW
GetStringTypeW
CreateFileW
SetEndOfFile
GetProcessHeap
GetUserDefaultLCID
RtlUnwind
EnumSystemLocalesA
IsValidLocale
InterlockedCompareExchange
InitializeCriticalSection
CreateMutexA
WaitForSingleObject
ReleaseMutex
OpenProcess
DebugBreak
SuspendThread
ResumeThread
SetThreadPriority
CreateThread
DuplicateHandle
GetThreadTimes
GetProcessTimes
GetExitCodeProcess
CreateProcessA
FindClose
FindNextFileA
FindFirstFileA
CopyFileA
MoveFileExA
RemoveDirectoryA
SetFilePointerEx
GetDiskFreeSpaceExA
CreateDirectoryA
LocalFree
MapViewOfFile
LocalAlloc
CreateFileMappingA
GetVersionExA
OpenFileMappingA
UnmapViewOfFile
Thread32Next
OpenThread
Thread32First
CreateToolhelp32Snapshot
SetCurrentDirectoryA
ExpandEnvironmentStringsA
FormatMessageW
GetModuleHandleA
OutputDebugStringA
SetEvent
WaitForMultipleObjects
GetThreadContext
CreateEventA
LoadLibraryA
GetEnvironmentVariableA
GetCurrentDirectoryA
GetTimeFormatA
GetDateFormatA
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetDriveTypeW
GetFullPathNameA
ExitThread
GetTimeZoneInformation
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
CompareStringW
SetEnvironmentVariableA
RaiseException
HeapFree
GetLastError
HeapAlloc
DecodePointer
ExitProcess
GetModuleHandleW
GetLocaleInfoA
GetProcAddress
user32
GetWindowTextA
GetClassNameA
GetWindowThreadProcessId
GetForegroundWindow
advapi32
FreeSid
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
RegOpenKeyExA
shell32
SHGetFolderPathA
Sections
.text Size: 676KB - Virtual size: 676KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 183KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 167KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ