C:\dev\Evolis_Premium_Suite\EPS\EvoSetting\Release\x86\EvoSetting.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-23_508e6930ccac13e87e80bac6c4284a47_mafia.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-23_508e6930ccac13e87e80bac6c4284a47_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-23_508e6930ccac13e87e80bac6c4284a47_mafia
-
Size
711KB
-
MD5
508e6930ccac13e87e80bac6c4284a47
-
SHA1
8d79233ca232b8bb7546ba65972f36705bc14997
-
SHA256
72a311b6d3c98d637fbffef7e83c0c2bda648579d697a1f06d18b90a2024bc90
-
SHA512
54d0abb1e3da4c4bb6b5a5f6038878bc3de5ddea3cfc7c4addd40613f4d18723770b7ead92a5e8f5006f7a27d36239e33dbcfad6186fa636009aaa87078ae8d9
-
SSDEEP
12288:C0DjKjYduOe7qA2p2huV8ngoPy22OaXbQY/JaYfjYvT:CzMu3r2p2gV8ng2P2OaXbQYxj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-23_508e6930ccac13e87e80bac6c4284a47_mafia
Files
-
2024-08-23_508e6930ccac13e87e80bac6c4284a47_mafia.exe windows:5 windows x86 arch:x86
ebb1b9b6e2cd95dd16c90227f4142b6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
evosetting
EvoSetting_SetValue
EvoSetting_GetCollectionSize
EvoSetting_GetSettingKey
EvoSetting_LoadProfile
EvoSetting_IsEnable
EvoSetting_Create
EvoSetting_Delete
EvoSetting_IsBound
EvoSetting_GetValue
EvoSetting_ContainsKey
EvoSetting_PushValue
EvoSetting_Unbind
EvoSetting_Pull
EvoSetting_Push
EvoSetting_SaveProfile
EvoSetting_ResetToFactorySetting
evobase
EvoBase_EncodeBinary
evomcl
EvoMcl_DeviceManager_OpenDevice
EvoMcl_DeviceManager_GetLastError
EvoMcl_DeviceManager_CloseDevice
EvoMcl_DeviceManager_GetEvoMclInterface
kernel32
SetLastError
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
GetModuleFileNameW
WideCharToMultiByte
WriteConsoleW
SetStdHandle
CreateFileW
LoadLibraryW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetProcAddress
GetModuleHandleW
ExitProcess
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
IsProcessorFeaturePresent
WriteFile
HeapCreate
SetFilePointer
ReadFile
CloseHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetEndOfFile
winspool.drv
EnumPrintersW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 101KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 576KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE