C:\tmp\COMPILE\Win_R5.3\Windows\STS_Manager\Release\get_license.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_3d2a3d3adab265b6d4dc3d7df570305a_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-07_3d2a3d3adab265b6d4dc3d7df570305a_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-07_3d2a3d3adab265b6d4dc3d7df570305a_mafia
-
Size
178KB
-
MD5
3d2a3d3adab265b6d4dc3d7df570305a
-
SHA1
4aab3eb8a90d69fafc672e536597e09b24e16f6c
-
SHA256
5bdcc0281f188c073012dc13cfbe0b5fa2bd370b045d186d7e86595909f272e1
-
SHA512
8e15ceec9909bcb7c56685bc486de68b0786feb28413564cbc6047858489116aa17088c53b83fc00974b10ec216e140b778f34ce34cb6a6b6aef699a75e5cdab
-
SSDEEP
3072:AQ14jXxXiwCe9UU76UGbx1R2NlLARgn63PjNGZjy/SCY7xt06fzG:AtiwC6F76bb3Zg6/0gSCEtI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-07_3d2a3d3adab265b6d4dc3d7df570305a_mafia
Files
-
2024-06-07_3d2a3d3adab265b6d4dc3d7df570305a_mafia.exe windows:5 windows x86 arch:x86
f19f0b104d5ddf95f102fd0ba89dab21
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ioctlsocket
getsockopt
ntohl
send
recv
connect
inet_addr
gethostbyname
getsockname
ntohs
inet_ntoa
accept
socket
setsockopt
closesocket
htons
htonl
bind
listen
select
WSAGetLastError
__WSAFDIsSet
gethostname
WSAStartup
WSACleanup
kernel32
SetEndOfFile
ReadFile
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetFilePointer
WriteConsoleW
GetStringTypeW
MultiByteToWideChar
LCMapStringW
SetStdHandle
CreateFileA
HeapReAlloc
GetProcessHeap
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
HeapDestroy
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
SetUnhandledExceptionFilter
CreateFileW
CompareStringW
HeapSize
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetLastError
HeapFree
GetCommandLineA
HeapSetInformation
InitializeCriticalSectionAndSpinCount
FatalAppExitA
EncodePointer
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
UnhandledExceptionFilter
SetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameW
SetHandleCount
GetFileType
GetStartupInfoW
Sleep
HeapAlloc
WideCharToMultiByte
GetTimeZoneInformation
RtlUnwind
CloseHandle
IsProcessorFeaturePresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapCreate
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ