C:\tmp\COMPILE\Win_R5.3\Windows\STS_Manager\Release\splogrep.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_d4c0ed5edb61d5cbf4d7e61b6e032b8e_mafia.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-14_d4c0ed5edb61d5cbf4d7e61b6e032b8e_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-14_d4c0ed5edb61d5cbf4d7e61b6e032b8e_mafia
-
Size
179KB
-
MD5
d4c0ed5edb61d5cbf4d7e61b6e032b8e
-
SHA1
dca14c071f4da6cedbcdca328d49f0d841f97ae7
-
SHA256
2e01280c29ca3a0ded1ce7ad64d36926cb9d9338c7344ec023333633c3488f8f
-
SHA512
710c87953ea89b58dc647c1c62e893caadffb54d5bd4f21fe37a75793b4031730861aa22955e9752cdfb4308add61f831ef15a99de65b49d1bc52f77d8a6f31e
-
SSDEEP
3072:+OhZCqa5R5EJNuskscEYuRGd27zdHIyfShDjRTlxtSGwA:+OZsEJPkscpuIePMx/tS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-14_d4c0ed5edb61d5cbf4d7e61b6e032b8e_mafia
Files
-
2024-06-14_d4c0ed5edb61d5cbf4d7e61b6e032b8e_mafia.exe windows:5 windows x86 arch:x86
4700219121fca078b9b1b5786d551819
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
ioctlsocket
getsockopt
ntohl
send
recv
connect
inet_addr
gethostbyname
getsockname
ntohs
inet_ntoa
select
__WSAFDIsSet
accept
socket
setsockopt
closesocket
htons
htonl
bind
listen
WSAGetLastError
WSAStartup
WSACleanup
gethostname
kernel32
GetExitCodeProcess
GetProcessHeap
SetEndOfFile
GetDriveTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
WriteConsoleW
HeapSize
GetStringTypeW
LCMapStringW
HeapReAlloc
SetStdHandle
SetFilePointer
GetTickCount
WaitForSingleObject
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetFileAttributesA
ReadFile
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
GetCurrentDirectoryA
SetUnhandledExceptionFilter
CreateProcessA
CreateFileW
QueryPerformanceCounter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
GetLastError
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapAlloc
CreateDirectoryA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCurrentProcessId
GetCommandLineA
HeapSetInformation
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
UnhandledExceptionFilter
CompareStringW
EncodePointer
TerminateProcess
GetCurrentProcess
CloseHandle
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThread
RtlUnwind
WideCharToMultiByte
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryW
GetLocaleInfoW
WriteFile
GetModuleFileNameW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapCreate
HeapDestroy
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
SetCurrentDirectoryW
MultiByteToWideChar
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ