E:\project\SogouFastInstall_SE\branch\SogouFastInstall_SE\MedalLoader\bin\Release\MedalLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_b24367443d356efa8e3a70b6123c9c85_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_b24367443d356efa8e3a70b6123c9c85_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_b24367443d356efa8e3a70b6123c9c85_mafia
-
Size
186KB
-
MD5
b24367443d356efa8e3a70b6123c9c85
-
SHA1
66969a4549805b33a055aeab79beaa4248714676
-
SHA256
5e92de69fd32372406a88f50b53a4e03bf0372b0f37a8dc40e585d11bd5db643
-
SHA512
51adec4760730c4421e7bf1df08a648884d081381205e5278b8a2eed5f6060415bca05075729984e10970b55263637ef0d07decd891f3766d212a4a23ee61bd0
-
SSDEEP
3072:wLrteJPy0kyuSL/vR4RSDk7ey3WQ3KWIMkuG9DUp0W7oLk8IAY:wLr4JPyquIDWCQ3fFJGhUumoLkKY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-14_b24367443d356efa8e3a70b6123c9c85_mafia
Files
-
2024-06-14_b24367443d356efa8e3a70b6123c9c85_mafia.exe windows:5 windows x86 arch:x86
e8c245c7f271597b0cb75673840e3822
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
HttpSendRequestExA
InternetReadFile
InternetWriteFile
InternetOpenA
HttpEndRequestA
InternetOpenUrlA
InternetCloseHandle
HttpEndRequestW
HttpQueryInfoA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
dbghelp
MiniDumpWriteDump
kernel32
GetStringTypeW
RtlUnwind
LocalFree
OutputDebugStringW
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
CreateFileW
ReadFile
CloseHandle
GetVersionExW
SetEvent
CreateEventW
CreateThread
WaitForSingleObject
DeleteFileW
WriteFile
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
RaiseException
SetLastError
GetCurrentProcess
FlushInstructionCache
Sleep
TerminateProcess
ExpandEnvironmentStringsW
GetCurrentProcessId
SetUnhandledExceptionFilter
FindFirstFileW
FindNextFileW
FindClose
SystemTimeToFileTime
RemoveDirectoryW
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
CreateMutexW
InterlockedExchange
ReleaseMutex
GetModuleHandleW
GetProcAddress
MoveFileExW
GetExitCodeProcess
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
HeapSize
GetModuleFileNameW
GetStdHandle
ExitProcess
HeapCreate
TlsFree
GetTickCount
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
SetFilePointer
InterlockedDecrement
GetConsoleCP
GetConsoleMode
LoadLibraryW
SetStdHandle
WriteConsoleW
FlushFileBuffers
GetSystemTime
InterlockedIncrement
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetCommandLineW
GetSystemTimeAsFileTime
IsDebuggerPresent
UnhandledExceptionFilter
ResumeThread
ExitThread
InterlockedCompareExchange
InterlockedPushEntrySList
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapReAlloc
EncodePointer
DecodePointer
user32
UnregisterClassA
KillTimer
PostQuitMessage
DestroyWindow
PostMessageW
SetTimer
FindWindowW
DispatchMessageW
TranslateMessage
CallWindowProcW
GetWindowLongW
SetWindowLongW
CreateWindowExW
LoadCursorW
GetClassInfoExW
RegisterClassExW
SendMessageW
DefWindowProcW
PostThreadMessageW
GetMessageW
PeekMessageW
LoadImageW
advapi32
CryptSetKeyParam
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CryptGetKeyParam
CryptDecrypt
CryptReleaseContext
CryptDestroyKey
CryptEncrypt
CryptImportKey
CryptAcquireContextW
shell32
Shell_NotifyIconW
CommandLineToArgvW
ShellExecuteExW
ord165
ole32
CoInitialize
shlwapi
PathFileExistsW
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ