E:\Linux\新建文件夹\s\exe\Debug\exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_433e18bbd4824a7de9cf4792ae78382a_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-08_433e18bbd4824a7de9cf4792ae78382a_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_433e18bbd4824a7de9cf4792ae78382a_mafia
-
Size
1018KB
-
MD5
433e18bbd4824a7de9cf4792ae78382a
-
SHA1
e269575c789e1c92f85b7c087eb2604106c3c3d8
-
SHA256
5f23d51627bd95f65d6078bfd033c8e65f2257bacc87ef5a89458044cc886724
-
SHA512
b01091796de38731cdfdceb2c6db6423e45cd6944aa2a8f5a29fb2393bd815edf4ef269e7e34353b936689bf1538c69d3ec29d29f55d4129725e356bd0c27446
-
SSDEEP
24576:/pXgJRn45/PIr9oPicgHEHvFb282ecMlyBP/2tTM+s:/pXgS3IyPicAiFV2ecMl5TMt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_433e18bbd4824a7de9cf4792ae78382a_mafia
Files
-
2024-09-08_433e18bbd4824a7de9cf4792ae78382a_mafia.exe windows:5 windows x86 arch:x86
ed3bae7cd939fdf401816063ade4bb1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentProcess
GetProcAddress
SetEndOfFile
ReadFile
InterlockedExchange
GetLocaleInfoW
GetFileAttributesA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoA
GetStringTypeW
CreateFileA
FlushFileBuffers
SetStdHandle
GetFileTime
CloseHandle
WriteFile
SetFileTime
GetModuleFileNameA
GetTempPathA
GetModuleHandleA
FindResourceA
SizeofResource
GetUserDefaultLCID
LoadResource
GetCommandLineA
HeapSetInformation
GetStartupInfoW
IsProcessorFeaturePresent
EncodePointer
DecodePointer
RaiseException
WideCharToMultiByte
IsDebuggerPresent
MultiByteToWideChar
lstrlenA
LoadLibraryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
HeapValidate
IsBadReadPtr
GetLastError
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
RtlUnwind
LCMapStringW
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThread
FatalAppExitA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
HeapFree
HeapAlloc
GetProcessHeap
VirtualQuery
FreeLibrary
OutputDebugStringA
WriteConsoleW
OutputDebugStringW
SetConsoleCtrlHandler
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapReAlloc
HeapSize
HeapQueryInformation
CreateFileW
user32
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
PostQuitMessage
PostMessageA
DestroyWindow
DefWindowProcA
advapi32
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
ControlService
RegDeleteValueA
StartServiceA
CloseServiceHandle
RegOpenKeyA
Sections
.textbss Size: - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 561KB - Virtual size: 561KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ