C:\Jarek\Projects\DCC\HO\bin\Win32\Release\MMVM\MMVM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_445bb016c55e4f2a48f2eee9b62a29f6_mafia_magniber_qakbot.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-29_445bb016c55e4f2a48f2eee9b62a29f6_mafia_magniber_qakbot.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-29_445bb016c55e4f2a48f2eee9b62a29f6_mafia_magniber_qakbot
-
Size
3.0MB
-
MD5
445bb016c55e4f2a48f2eee9b62a29f6
-
SHA1
e5cd9134e4afa85957046dafa8afeeb8cb108270
-
SHA256
b69376ef5c2c2d8185a2e9ae5db8d7a3abe05da744727e6e78521e896059ad32
-
SHA512
66752515ffa1513a79a5744bfe4fcc06d34b18973bc6428dfcc5b652eade7207f25dbc192b693983fea9e015947a13963c2944a04c5649aeb6733a619bdd839e
-
SSDEEP
49152:RNGZ2rjjZY4B3dnTPrXKKlP/kAvM3YXyhnH0E6Fd6zCnuKlKuuGaXKy4IBAUZLYx:sKjjZpF7rXKU/7MEG6LeBAUZLeDiQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-29_445bb016c55e4f2a48f2eee9b62a29f6_mafia_magniber_qakbot
Files
-
2024-05-29_445bb016c55e4f2a48f2eee9b62a29f6_mafia_magniber_qakbot.exe windows:5 windows x86 arch:x86
ed6eaadab86906293089bdd7506802cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetModuleHandleA
GetCurrentProcessId
GetCurrentProcess
GetCurrentThreadId
CreateFileA
LoadLibraryA
SetErrorMode
SetUnhandledExceptionFilter
GetModuleFileNameA
Sleep
CreateThread
TerminateProcess
GetCurrentThread
GetLocaleInfoA
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
TerminateThread
MultiByteToWideChar
ReadFile
GetExitCodeProcess
DuplicateHandle
CreatePipe
GetTickCount
FreeLibrary
SetLastError
ReadProcessMemory
GetLastError
GetEnvironmentVariableA
GetVersionExA
ResumeThread
GetThreadContext
SuspendThread
GetACP
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RtlUnwind
EncodePointer
DecodePointer
HeapAlloc
GetSystemTimeAsFileTime
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
DeleteFileA
GetModuleHandleW
ExitProcess
HeapFree
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCPInfo
GetOEMCP
IsValidCodePage
WideCharToMultiByte
LCMapStringW
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
IsProcessorFeaturePresent
HeapSize
HeapQueryInformation
GetTimeZoneInformation
SetStdHandle
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
SetCurrentDirectoryW
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FatalAppExitA
SetConsoleCtrlHandler
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
RaiseException
SetEndOfFile
GetProcessHeap
GetDriveTypeW
WriteConsoleW
CreateFileW
CompareStringW
SetEnvironmentVariableA
GetSystemInfo
QueryPerformanceFrequency
InitializeCriticalSection
LocalAlloc
LocalFree
GetComputerNameA
GetDiskFreeSpaceA
GlobalMemoryStatus
GetLocalTime
DeviceIoControl
VirtualQuery
QueryPerformanceCounter
GetFileAttributesA
CreateDirectoryA
DebugBreak
ReleaseMutex
CreateMutexA
GetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
CloseHandle
SetHandleCount
GetTempPathA
advapi32
GetUserNameA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
user32
AdjustWindowRectEx
GetAsyncKeyState
LoadCursorA
GetMonitorInfoA
MonitorFromWindow
PeekMessageA
TranslateMessage
DispatchMessageA
InflateRect
OffsetRect
SetWindowTextA
SetRect
SetWindowPos
SetWindowLongA
GetWindowLongA
ShowWindow
MessageBoxA
GetClientRect
MsgWaitForMultipleObjects
DestroyWindow
MonitorFromPoint
CreateWindowExA
GetDC
ClientToScreen
LoadIconA
RegisterClassA
DefWindowProcA
ReleaseCapture
SetCapture
ShowCursor
SetForegroundWindow
SetCursor
ReleaseDC
gdi32
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
GetStockObject
SelectObject
CreateCompatibleBitmap
shell32
SHGetSpecialFolderPathA
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
libegl
ord1
ord4
ord12
ord8
ord22
ord5
ord29
ord34
ord24
ord25
ord7
ord13
ord9
ord11
ord23
ord14
ord3
ord2
ord30
ord32
libglesv2
ord37
ord30
ord33
ord93
ord54
ord25
ord47
ord52
ord95
ord6
ord53
ord28
ord16
ord18
ord112
ord113
ord77
ord34
ord69
ord68
ord21
ord36
ord27
ord32
ord66
ord65
ord90
ord3
ord2
ord26
ord22
ord91
ord61
ord124
ord125
ord114
ord72
ord64
ord131
ord42
ord43
ord11
ord39
ord41
ord141
ord44
ord40
ord14
ord29
ord50
ord4
ord13
ord5
ord48
ord142
ord97
ord31
ord1
ord106
ord109
ord46
ord7
ord24
ord130
ord139
ord17
ord99
ord49
openal32
alBufferData
alDeleteBuffers
alSourceStop
alSourcei
alSourcefv
alSourcef
alListenerf
alGetSourcei
alListenerfv
alDistanceModel
alGenSources
alGetString
alcMakeContextCurrent
alcCreateContext
alcOpenDevice
alcGetString
alcCloseDevice
alcDestroyContext
alDeleteSources
alSourcePlay
alGenBuffers
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 46KB - Virtual size: 673KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 169KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ