C:\MinGW\msys\1.0\home\Administrator\nginx\objs.msvc8\nginx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_49d28bdbbf9014afb984738f04bd6644_floxif_mafia_qakbot_revil.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-15_49d28bdbbf9014afb984738f04bd6644_floxif_mafia_qakbot_revil.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-15_49d28bdbbf9014afb984738f04bd6644_floxif_mafia_qakbot_revil
-
Size
4.6MB
-
MD5
49d28bdbbf9014afb984738f04bd6644
-
SHA1
78dbad03042ee08465daf61602c794d4c3c4762c
-
SHA256
afd2b84e6d919da24da45be8f34db74bbcbce158ec30869761e94bc258e213cc
-
SHA512
78115251060cbb24e91906af1888921b34e1ff83025da5e63a284b3bafbb1f191dd84a74b91fc665ac9d6101e491475eed2ffe5652d7673b40b61e6bbd378136
-
SSDEEP
98304:DcxGy2klzIyeuRxp4qaedgNtAC7R8/XW0kc9GVq:fxklzIyeuRxp4qaedgXAC7f7cEVq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-15_49d28bdbbf9014afb984738f04bd6644_floxif_mafia_qakbot_revil
Files
-
2024-06-15_49d28bdbbf9014afb984738f04bd6644_floxif_mafia_qakbot_revil.exe windows:5 windows x86 arch:x86
0e2af6edb1af9bc7be616d3826843597
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileW
CreateDirectoryW
RemoveDirectoryW
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetCurrentDirectoryW
FindNextFileW
MapViewOfFileEx
GetSystemTimeAsFileTime
GetTimeZoneInformation
CreateProcessA
TerminateProcess
ResetEvent
OpenEventA
GetExitCodeProcess
WaitForMultipleObjects
GetCommandLineA
GetModuleFileNameA
CreateThread
GetEnvironmentVariableA
GetModuleHandleA
GetSystemInfo
GetVersionExA
SetEvent
CreateEventA
SetFilePointerEx
SetConsoleCtrlHandler
FreeConsole
ReleaseMutex
OpenMutexA
CreateMutexA
SetEnvironmentVariableA
CreateIoCompletionPort
GetQueuedCompletionStatus
SetEndOfFile
CreateFileMappingA
MapViewOfFile
GetFileAttributesExW
MoveFileW
DeleteFileW
CreateFileW
GetLongPathNameW
FindClose
UnmapViewOfFile
SetFileTime
WriteFile
ReadFile
FormatMessageA
Sleep
SwitchToThread
InterlockedCompareExchange
SetLastError
GetFileInformationByHandle
SetStdHandle
GetCurrentThreadId
InterlockedExchangeAdd
WriteConsoleW
GetProcessHeap
GetDriveTypeW
CompareStringW
RtlUnwind
HeapSize
SetFilePointer
FlushFileBuffers
GetConsoleCP
SetCurrentDirectoryW
CreateFileA
PeekNamedPipe
GetFullPathNameA
GetTickCount
GetStartupInfoW
SetHandleCount
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CloseHandle
FreeLibrary
GetLastError
WaitForSingleObject
GetStdHandle
SystemTimeToFileTime
GetSystemTime
DeleteFiber
SwitchToFiber
CreateFiber
VirtualFree
VirtualLock
VirtualProtect
VirtualAlloc
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
GetSystemDirectoryA
GetModuleHandleW
GetVersion
GetFileType
QueryPerformanceCounter
GetACP
GetEnvironmentVariableW
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
HeapFree
ExitProcess
DecodePointer
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetTimeFormatA
GetDateFormatA
HeapSetInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
InterlockedExchange
HeapReAlloc
EncodePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FatalAppExitA
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
GetModuleFileNameW
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
GetProcessWindowStation
MessageBoxW
CharToOemBuffA
GetUserObjectInformationW
advapi32
CryptGetProvParam
CryptCreateHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegSetValueExA
ReportEventW
RegisterEventSourceW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
CryptEnumProvidersW
CryptDestroyKey
CryptDecrypt
CryptGetUserKey
CryptExportKey
CryptDestroyHash
CryptSignHashW
CryptSetHashParam
RegCreateKeyExA
ws2_32
__WSAFDIsSet
WSAStartup
WSAIoctl
WSASend
WSAGetOverlappedResult
WSARecv
ioctlsocket
accept
connect
gethostname
WSASocketW
select
recv
shutdown
setsockopt
bind
closesocket
listen
getsockname
WSAGetLastError
getsockopt
getaddrinfo
freeaddrinfo
htons
ntohs
ntohl
htonl
WSASetLastError
send
inet_addr
gethostbyname
inet_ntoa
getservbyname
gethostbyaddr
getservbyport
WSACleanup
socket
crypt32
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertFreeCertificateContext
CertDuplicateCertificateContext
Sections
.text Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 820KB - Virtual size: 819KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 122KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ