C:\work\git\binaries\Installer\Release\ZonaInstallerFull.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-19_752ba3bf4b627e1a78275719cf9e41a4_mafia_rhadamanthys.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-19_752ba3bf4b627e1a78275719cf9e41a4_mafia_rhadamanthys.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-19_752ba3bf4b627e1a78275719cf9e41a4_mafia_rhadamanthys
-
Size
63.6MB
-
MD5
752ba3bf4b627e1a78275719cf9e41a4
-
SHA1
6cfd8b9934b0fbc31f2f8bc83c89fed2e25f2aad
-
SHA256
5f3cc281a34872f7732d1174eca50fb85364927cca8dc70ac31623ff38c20a00
-
SHA512
a856a2f05df0c0b72b3ca4d8353043623bcc7892a935471d5da28d559ea91411aeee0548b530361633ea436d3d9728f6a604397fbda301fcc908b062dd2bf3e4
-
SSDEEP
1572864:ZSfGaond8g7g64PVkFq/NboJNbbq+veWg+UGEh4J:ZIFony3kYWbqNWg+UGqg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-12-19_752ba3bf4b627e1a78275719cf9e41a4_mafia_rhadamanthys
Files
-
2024-12-19_752ba3bf4b627e1a78275719cf9e41a4_mafia_rhadamanthys.exe windows:5 windows x86 arch:x86
692b976bbef3f23b706abc2a500ac0ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
uxtheme
DrawThemeText
IsThemeActive
DrawThemeBackground
OpenThemeData
shlwapi
wnsprintfW
PathIsDirectoryW
StrToIntW
ord12
gdiplus
GdipLoadImageFromStream
GdipGetImageBounds
GdipCreatePen1
GdipDrawLineI
GdipCreateFromHDC
GdipAlloc
GdipDeletePen
GdipFree
GdiplusStartup
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipDisposeImage
GdipCloneImage
GdipDrawImageRectI
kernel32
LoadResource
WaitForSingleObject
GetLastError
CloseHandle
GetTempFileNameW
FindFirstFileW
SetFilePointer
GetDriveTypeW
CreateProcessW
SystemTimeToFileTime
GetCurrentProcess
GetLogicalDriveStringsW
CreateDirectoryW
GlobalLock
GetModuleHandleW
WriteFile
GlobalAlloc
WideCharToMultiByte
Sleep
SizeofResource
GetVersionExW
GetExitCodeProcess
GetFileAttributesW
TerminateProcess
ReadFile
GetModuleFileNameW
CreateFileW
MultiByteToWideChar
GlobalUnlock
GetTempPathW
GetFileSizeEx
SetLastError
GetProcAddress
GlobalFree
FindClose
Process32FirstW
LocalAlloc
RemoveDirectoryW
CreatePipe
Process32NextW
GetModuleHandleA
FindNextFileW
CreateToolhelp32Snapshot
GetShortPathNameW
GetDiskFreeSpaceExW
LocalFree
GetSystemTime
SetFileAttributesW
ExpandEnvironmentStringsW
GetTickCount
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemDefaultLangID
EnumSystemLocalesA
FreeResource
GetFileSize
FormatMessageW
InterlockedDecrement
FindResourceW
TerminateThread
CreateThread
GlobalMemoryStatusEx
GetCurrentProcessId
VerSetConditionMask
VerifyVersionInfoW
GetWindowsDirectoryW
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLocaleInfoW
GetStdHandle
HeapDestroy
HeapCreate
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CompareStringW
LCMapStringW
RtlUnwind
RaiseException
GetCPInfo
ExitProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileExW
HeapAlloc
GetSystemTimeAsFileTime
CreateMutexW
GetLongPathNameW
DeleteFileW
DeleteCriticalSection
IsValidCodePage
LoadLibraryW
GetUserDefaultLCID
lstrlenA
IsValidLocale
SetStdHandle
WriteConsoleW
GetTimeZoneInformation
SetEnvironmentVariableW
SetEndOfFile
GetProcessHeap
SetEnvironmentVariableA
GetVolumeInformationW
GetExitCodeThread
LockResource
FindResourceExW
GetLocaleInfoA
GetUserDefaultLangID
HeapReAlloc
GetStartupInfoW
HeapSetInformation
GetCommandLineW
HeapFree
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedCompareExchange
InterlockedIncrement
user32
SetWindowPos
SetWindowLongW
GetWindowLongW
LoadIconW
RegisterClassExW
LoadAcceleratorsW
CreateWindowExW
GetClientRect
LoadCursorW
PostQuitMessage
GetMessageW
GetDesktopWindow
GetSystemMetrics
MessageBoxW
SendMessageW
DrawTextW
DefWindowProcW
DispatchMessageW
TranslateMessage
ShowWindow
UpdateWindow
PostMessageW
GetWindowRect
GetClassInfoW
EndPaint
BeginPaint
CallWindowProcW
DrawStateW
DrawFrameControl
wsprintfW
DestroyWindow
InvalidateRect
GetWindowTextW
EnableWindow
SetWindowTextW
TranslateAcceleratorW
gdi32
SetTextAlign
SetTextColor
SetBkMode
GetTextColor
GetTextExtentPoint32W
CreateFontW
DeleteDC
SelectObject
CreateCompatibleDC
TextOutW
advapi32
OpenProcessToken
GetUserNameA
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
EqualSid
RegCreateKeyExW
GetTokenInformation
shell32
SHCreateDirectoryExW
SHGetMalloc
SHGetPathFromIDListW
SHChangeNotify
ShellExecuteExW
SHGetFolderPathW
ShellExecuteW
ord165
SHFileOperationW
CommandLineToArgvW
SHBrowseForFolderW
ole32
OleRun
CoSetProxyBlanket
CoInitializeSecurity
CreateStreamOnHGlobal
CLSIDFromProgID
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
GetErrorInfo
SysFreeString
VariantClear
SysAllocString
wininet
InternetQueryOptionW
InternetCloseHandle
InternetReadFile
HttpOpenRequestW
HttpQueryInfoW
HttpAddRequestHeadersW
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
Sections
.text Size: 464KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63.0MB - Virtual size: 63.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ