Static task
static1
Behavioral task
behavioral1
Sample
67f86e36617a9ffb54e797c7d26b8a3d_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
67f86e36617a9ffb54e797c7d26b8a3d_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
67f86e36617a9ffb54e797c7d26b8a3d_mafia_JC.exe
-
Size
266KB
-
MD5
67f86e36617a9ffb54e797c7d26b8a3d
-
SHA1
26e976741dc2fec05e8ca77aca1bb2d821b091ee
-
SHA256
1ccabbcce9b5fea789912d1a2934758014294a6a931fb0fd887996392c31aac7
-
SHA512
a418dad178e1ef1b4d5e7ee9df332b0e5f05164a7b750235ed101988ed3e8580675906e21ac0071d5b1f48c2ffe538998fd581954f8056f98169b1280a13e009
-
SSDEEP
3072:A+p47V0IkTj6HZOYVKnZ/3PMmjWgm5JmW9VmCgNtk2zoENq0UgWcxA+4qJO63rTz:MDI6OlZ/3OgjQKHdz1jWJ+dJb3b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67f86e36617a9ffb54e797c7d26b8a3d_mafia_JC.exe
Files
-
67f86e36617a9ffb54e797c7d26b8a3d_mafia_JC.exe.exe windows x86
38964fb07626f8c97b556fe092e44617
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
socket
closesocket
WSAStartup
WSACleanup
send
connect
htons
sendto
recv
gethostbyname
psapi
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
kernel32
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetSystemTimeAsFileTime
GetComputerNameA
CreateFileA
FindResourceA
FreeResource
FreeLibrary
LoadResource
HeapAlloc
HeapFree
GetTickCount
GetProcessHeap
ExpandEnvironmentStringsA
CreateRemoteThread
GetWindowsDirectoryA
WriteFile
WriteConsoleW
GetVolumeInformationA
Sleep
SizeofResource
GetFileAttributesA
CreateProcessA
GetEnvironmentVariableA
GetLastError
lstrcmpiA
GetProcAddress
CopyFileA
SetFileAttributesA
VirtualAllocEx
LoadLibraryA
LockResource
GetSystemInfo
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
GetVersionExA
CloseHandle
GetTempPathA
WriteProcessMemory
CreateThread
lstrlenA
SetErrorMode
SetEndOfFile
ReadFile
OpenProcess
GetCurrentProcessId
QueryPerformanceCounter
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
CreateFileW
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
GetStdHandle
GetModuleFileNameW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ