E:\Team Projects\Jon\MDaemon10\Release\14.5\DMARCReporter\Release\DMARCReporter.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_458a3c04f60210a4125db817737591b3_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-04_458a3c04f60210a4125db817737591b3_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-04_458a3c04f60210a4125db817737591b3_mafia
-
Size
205KB
-
MD5
458a3c04f60210a4125db817737591b3
-
SHA1
095676799b84f13187720c6ecc063521220026a1
-
SHA256
07379c22a645d67a47ae449014e8d827f9fc3b82a16e3476e31143371fc578b6
-
SHA512
0dd1f9339f265bc0d97832ea915f2142713c7e52539603452c7b8222cd9ce0fba2f27967bd64831a7a141cdffe75d5dae16e67cd159c71a38256b18268233518
-
SSDEEP
3072:TW2ErjNOmblv3C9WcvamKDXRw3SPCiSwOCUJtVwomXLj6NEpdG:a2EPoE1C9rUXCiluCd7b2NCk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-04_458a3c04f60210a4125db817737591b3_mafia
Files
-
2024-06-04_458a3c04f60210a4125db817737591b3_mafia.exe windows:5 windows x86 arch:x86
914d7671a1205f06532b7b544ba22b3c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
xceedzip
ord5
ord167
ord6
ord131
ord125
ord53
ord8
ord9
kernel32
GetSystemTimeAsFileTime
WideCharToMultiByte
GetFileAttributesA
GetTimeZoneInformation
MultiByteToWideChar
CreateDirectoryA
FindFirstFileA
GetLastError
RemoveDirectoryA
FindClose
GetPrivateProfileStringA
GetFileType
FindNextFileA
CloseHandle
DeleteFileA
InterlockedIncrement
InterlockedDecrement
GetSystemTime
lstrlenA
SetEnvironmentVariableA
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
LocalFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
DecodePointer
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
GetStringTypeW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetLocaleInfoW
GetModuleFileNameW
HeapSize
FlushFileBuffers
GetConsoleMode
EncodePointer
GetConsoleCP
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineA
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
IsProcessorFeaturePresent
HeapCreate
ExitProcess
ReadFile
SetFilePointer
WriteFile
IsValidLocale
ole32
CoCreateInstance
CoUninitialize
CoInitialize
OleRun
oleaut32
SysFreeString
GetErrorInfo
VariantClear
SysAllocString
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ