C:\buberayekeviben.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia
-
Size
544KB
-
MD5
bccd7ee1ecfdc960bb93c174e458e9cb
-
SHA1
0e4452d98dc1744003efccd3d07c30121d0d34ad
-
SHA256
4a2aa1c96230767fd269d331e747c95662c041eea0eda1e2f460615fb6ea64d2
-
SHA512
b6cee268576d1cdc61c50dff72bbd742e1afd41b13ef19f7d60e735d662a7e5979863bad7ce8d654675e059c19b504e6a2a7b8e1f7e39a280ff3c57b6c7dd608
-
SSDEEP
12288:imV8bAHBatyrQ46L2oGCPh5eAEJ1+rCxjiN5d:imV8bVt+Q41pxJG5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia
Files
-
2025-01-24_bccd7ee1ecfdc960bb93c174e458e9cb_mafia.exe windows:5 windows x86 arch:x86
66b3c5b61438299302b3aa408fcd3565
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetTickCount
GetProcessHeap
ExpandEnvironmentStringsA
VirtualQueryEx
CreateActCtxW
ActivateActCtx
SetCommConfig
CreateEventA
TerminateProcess
GetStringTypeExA
GetNumaHighestNodeNumber
LocalAlloc
_lread
UpdateResourceW
VirtualProtect
DeleteFileW
FindActCtxSectionStringW
SetEvent
GetTimeFormatA
SetDefaultCommConfigW
GetNumberOfConsoleMouseButtons
LoadResource
GetProcessIoCounters
SetEndOfFile
GetProcAddress
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
TlsGetValue
TlsSetValue
GetModuleHandleW
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
LoadLibraryW
Sections
.text Size: 383KB - Virtual size: 382KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 50.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kekowik Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ