F:\devops_yanfa\agent\workspace\p-96bb3f2b49c74bc5aeaa662a22f5b07a\src\ModuleUpgrade\SharpUpgrade\Release\InstallAssistService.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-01_b722f1189cee96eceffce9af21b6b3e8_floxif_mafia.exe
Resource
win7-20240903-en
General
-
Target
2025-01-01_b722f1189cee96eceffce9af21b6b3e8_floxif_mafia
-
Size
1.8MB
-
MD5
b722f1189cee96eceffce9af21b6b3e8
-
SHA1
e2a9510bbdef798ec7d0bb3acecfd8777d0cc383
-
SHA256
6968625a70891253b0b2ec3dd90c8089fef39691087c056c18754e8149b2b888
-
SHA512
0e0cd70106be67d147edcc26eae89c5a6e0e7818c782db2863ee596ecc8b5492610405f5eb79adabaad195b25a14d6d331c45a126126467c7fa8c55bcdbc4196
-
SSDEEP
24576:LnR+T6BSe97KIcivdPAfYLH8AcevDN0FImbwQuq3Wia7gDjrEH7s:LJ971civdPAQgAT76sQuE5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-01_b722f1189cee96eceffce9af21b6b3e8_floxif_mafia
Files
-
2025-01-01_b722f1189cee96eceffce9af21b6b3e8_floxif_mafia.exe windows:5 windows x86 arch:x86
416333ed07e4ed6742e90b5c6a8f2c8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameW
Sleep
WTSGetActiveConsoleSessionId
OpenProcess
GetCurrentThread
GetCurrentProcess
CloseHandle
QueueUserWorkItem
CreateEventW
GetLastError
SetEvent
WaitForSingleObject
CompareStringW
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetLocaleInfoW
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
FlushFileBuffers
GetConsoleMode
GetConsoleCP
WriteFile
SetFilePointer
ReadFile
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
GetStringTypeW
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetFileAttributesA
CreateDirectoryA
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
GetCommandLineW
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
HeapCreate
ExitProcess
SetEnvironmentVariableA
advapi32
GetTokenInformation
ControlService
QueryServiceStatus
StartServiceW
ChangeServiceConfig2W
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
ReportEventW
RegisterServiceCtrlHandlerW
SetServiceStatus
DeregisterEventSource
StartServiceCtrlDispatcherW
RegisterEventSourceW
FreeSid
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
EqualSid
CreateProcessAsUserW
SetTokenInformation
DuplicateTokenEx
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
wtsapi32
WTSEnumerateSessionsW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
ws2_32
sendto
bind
socket
closesocket
setsockopt
getsockname
ntohs
WSAStartup
recvfrom
htons
htonl
inet_addr
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 242KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE