C:\dev\Infor10SCE_10.3_GA_Warrantee\wm9-client\RFSource\rf\Windows\Release\Trident.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_7cf240747503b14b9bea8a9a8f1e2021_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-25_7cf240747503b14b9bea8a9a8f1e2021_mafia.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-06-25_7cf240747503b14b9bea8a9a8f1e2021_mafia
-
Size
910KB
-
MD5
7cf240747503b14b9bea8a9a8f1e2021
-
SHA1
57fe4397e3b6fdef8f23917406659557a83270c9
-
SHA256
89352f771929bdd40b6027182cdd7c5934c07f263c28ef622ea156c3f2852326
-
SHA512
cbfbe115e1030725480f14b4694035678e74b9b3f511771854975d639086ac534d17b583dd72479a4974c4aac86e8d66a78a7d535fc24e0852d46ee5cffde872
-
SSDEEP
24576:+8HPBe/rd26Wni++5KAd09z252P04tAdOvSV4V+mIEXJi7/bbpDtTuaF:+8HPBe/rd26Wni+UKAd0h252P04tAdO6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-25_7cf240747503b14b9bea8a9a8f1e2021_mafia
Files
-
2024-06-25_7cf240747503b14b9bea8a9a8f1e2021_mafia.exe windows:5 windows x86 arch:x86
38ea8ac212d0fb842e33721c10e334b7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wsock32
WSACleanup
bind
htons
gethostbyname
gethostname
socket
connect
closesocket
WSAGetLastError
recv
send
accept
listen
WSAStartup
pdcurses
wattron
wattr_get
getcury
getcurx
wmove
wclear
wrefresh
wattroff
LINES
COLS
initscr
stdscr
keypad
cbreak
noecho
wadd_wch
getmaxx
getmaxy
waddwstr
wgetch
subwin
delwin
PDC_ungetch
curs_set
scrollok
nocbreak
halfdelay
PDC_set_title
endwin
kernel32
RaiseException
SetEndOfFile
CreateFileW
CreateFileA
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetLocaleInfoW
FreeLibrary
LoadLibraryW
SetConsoleCtrlHandler
IsValidCodePage
GetOEMCP
GetACP
HeapDestroy
HeapCreate
CloseHandle
FlushFileBuffers
SetFilePointer
ReadFile
GetConsoleMode
WriteFile
FatalAppExitA
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
SetHandleCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetCurrentThread
GetLastError
WideCharToMultiByte
MultiByteToWideChar
SetConsoleCP
SetConsoleOutputCP
GetConsoleCP
GetConsoleOutputCP
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
InterlockedCompareExchange
InterlockedExchange
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
RtlUnwind
GetProcessHeap
HeapFree
WriteConsoleW
GetFileType
GetStdHandle
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
ExitProcess
GetDriveTypeW
GetFullPathNameA
GetCommandLineW
HeapSetInformation
HeapAlloc
LCMapStringW
GetCPInfo
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sections
.text Size: 787KB - Virtual size: 786KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ