E:\Linux\新建文件夹\s\exe\Debug\exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_21377c1762af5b4d05ea9f2b93c1f50f_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-08_21377c1762af5b4d05ea9f2b93c1f50f_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_21377c1762af5b4d05ea9f2b93c1f50f_mafia
-
Size
1019KB
-
MD5
21377c1762af5b4d05ea9f2b93c1f50f
-
SHA1
17e4ba161c7d4e18e8abee02fcbddef496cfcf15
-
SHA256
f986393d3dd17e3095c08b4a6393c14e37c4ea204040b96f3b31c035c5d4b0d7
-
SHA512
a3bdb2d0de7e8129d4d643a81b66050bc22025384aa2618fac74895f8649fee9696eea498614f7cb37ac661a32970fe0e13b84d5cbcc62370f494fd81acc39ef
-
SSDEEP
24576:2pXgJRn45/PIr9oPicxHEHvFb282ecMlyBP/2tTM+L:2pXgS3IyPicFiFV2ecMl5TMW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_21377c1762af5b4d05ea9f2b93c1f50f_mafia
Files
-
2024-09-08_21377c1762af5b4d05ea9f2b93c1f50f_mafia.exe windows:5 windows x86 arch:x86
ed3bae7cd939fdf401816063ade4bb1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetProcAddress
SetEndOfFile
ReadFile
InterlockedExchange
GetLocaleInfoW
GetFileAttributesA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetStringTypeW
CreateFileA
FlushFileBuffers
SetStdHandle
GetFileTime
CloseHandle
WriteFile
SetFileTime
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
FindResourceA
SizeofResource
GetUserDefaultLCID
LoadResource
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
LoadLibraryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
GetLastError
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
RtlUnwind
LCMapStringW
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThread
FatalAppExitA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
HeapSize
HeapQueryInformation
CreateFileW
user32
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
PostQuitMessage
PostMessageA
DestroyWindow
DefWindowProcA
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
RegDeleteValueA
StartServiceA
CloseServiceHandle
RegOpenKeyA
Sections
.textbss Size: - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 562KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ