C:\MinGW\msys\1.0\home\Administrator\nginx\objs.msvc8\nginx.pdb
Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_f1ab5e4ef33da0b1cf66a9e6493ad90d_floxif_mafia_qakbot_revil.exe
Resource
win7-20240903-en
General
-
Target
2025-01-24_f1ab5e4ef33da0b1cf66a9e6493ad90d_floxif_mafia_qakbot_revil
-
Size
4.6MB
-
MD5
f1ab5e4ef33da0b1cf66a9e6493ad90d
-
SHA1
47b845ddf73d2dc4c7b145e9467f8074105eefc7
-
SHA256
9c18887480845ab15764d0387ec4ee8b221fdded241baeccd64888194a46c20e
-
SHA512
8395187bb5ae1351f4eeea8e128dc6914223541099412b26cf6ec80fea032b28a5d6f8aaf3aeb345f3797bc0335f8ea3c63a2593f2b540fe191f72d647c53845
-
SSDEEP
98304:DcxGy2klzIyeuRxp4qaedgNtAC72B/XW02c9GVe:fxklzIyeuRxp4qaedgXAC7HNcEVe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-24_f1ab5e4ef33da0b1cf66a9e6493ad90d_floxif_mafia_qakbot_revil
Files
-
2025-01-24_f1ab5e4ef33da0b1cf66a9e6493ad90d_floxif_mafia_qakbot_revil.exe windows:5 windows x86 arch:x86
0e2af6edb1af9bc7be616d3826843597
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
FindFirstFileW
CreateDirectoryW
RemoveDirectoryW
GetDiskFreeSpaceW
GetDiskFreeSpaceExW
GetCurrentDirectoryW
FindNextFileW
MapViewOfFileEx
GetSystemTimeAsFileTime
GetTimeZoneInformation
CreateProcessA
TerminateProcess
ResetEvent
OpenEventA
GetExitCodeProcess
WaitForMultipleObjects
GetCommandLineA
GetModuleFileNameA
CreateThread
GetEnvironmentVariableA
GetModuleHandleA
GetSystemInfo
GetVersionExA
SetEvent
CreateEventA
SetFilePointerEx
SetConsoleCtrlHandler
FreeConsole
ReleaseMutex
OpenMutexA
CreateMutexA
SetEnvironmentVariableA
CreateIoCompletionPort
GetQueuedCompletionStatus
SetEndOfFile
CreateFileMappingA
MapViewOfFile
GetFileAttributesExW
MoveFileW
DeleteFileW
CreateFileW
GetLongPathNameW
FindClose
UnmapViewOfFile
SetFileTime
WriteFile
ReadFile
FormatMessageA
Sleep
SwitchToThread
InterlockedCompareExchange
SetLastError
GetFileInformationByHandle
SetStdHandle
GetCurrentThreadId
InterlockedExchangeAdd
WriteConsoleW
GetProcessHeap
GetDriveTypeW
CompareStringW
RtlUnwind
HeapSize
SetFilePointer
FlushFileBuffers
GetConsoleCP
SetCurrentDirectoryW
CreateFileA
PeekNamedPipe
GetFullPathNameA
GetTickCount
GetStartupInfoW
SetHandleCount
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CloseHandle
FreeLibrary
GetLastError
WaitForSingleObject
GetStdHandle
SystemTimeToFileTime
GetSystemTime
DeleteFiber
SwitchToFiber
CreateFiber
VirtualFree
VirtualLock
VirtualProtect
VirtualAlloc
WideCharToMultiByte
MultiByteToWideChar
GetModuleHandleExW
GetSystemDirectoryA
GetModuleHandleW
GetVersion
GetFileType
QueryPerformanceCounter
GetACP
GetEnvironmentVariableW
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
HeapFree
ExitProcess
DecodePointer
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetTimeFormatA
GetDateFormatA
HeapSetInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
InterlockedExchange
HeapReAlloc
EncodePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FatalAppExitA
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThread
GetModuleFileNameW
GetCPInfo
GetOEMCP
IsValidCodePage
LCMapStringW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
user32
GetProcessWindowStation
MessageBoxW
CharToOemBuffA
GetUserObjectInformationW
advapi32
CryptGetProvParam
CryptCreateHash
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegCloseKey
RegSetValueExA
ReportEventW
RegisterEventSourceW
CryptReleaseContext
CryptGenRandom
CryptAcquireContextW
CryptEnumProvidersW
CryptDestroyKey
CryptDecrypt
CryptGetUserKey
CryptExportKey
CryptDestroyHash
CryptSignHashW
CryptSetHashParam
RegCreateKeyExA
ws2_32
__WSAFDIsSet
WSAStartup
WSAIoctl
WSASend
WSAGetOverlappedResult
WSARecv
ioctlsocket
accept
connect
gethostname
WSASocketW
select
recv
shutdown
setsockopt
bind
closesocket
listen
getsockname
WSAGetLastError
getsockopt
getaddrinfo
freeaddrinfo
htons
ntohs
ntohl
htonl
WSASetLastError
send
inet_addr
gethostbyname
inet_ntoa
getservbyname
gethostbyaddr
getservbyport
WSACleanup
socket
crypt32
CertGetCertificateContextProperty
CertOpenStore
CertFindCertificateInStore
CertEnumCertificatesInStore
CertCloseStore
CertFreeCertificateContext
CertDuplicateCertificateContext
Sections
.text Size: 3.4MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 820KB - Virtual size: 819KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 122KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ