Static task
static1
Behavioral task
behavioral1
Sample
882959554fe574a0c9e8dc94e0ec1d18_mafia_JC.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
882959554fe574a0c9e8dc94e0ec1d18_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
882959554fe574a0c9e8dc94e0ec1d18_mafia_JC.exe
-
Size
266KB
-
MD5
882959554fe574a0c9e8dc94e0ec1d18
-
SHA1
f307d9fb2b9c3d52128ee962ea7b569c2b8fb7a0
-
SHA256
6810cda65924b4787669fcf5dd68d745c5315c73327fca35943c394d7d32c884
-
SHA512
59b5ea60a51b3086f96ee6162179a9256d0d9da36ec136cd25564246283657bd49f28fe34156170dc19869742e8159c11d41e834550aaa9168ef9dc7befcf18a
-
SSDEEP
3072:A+p47V0IkTj6HZOYVKnZ/3PMmjWgm5JmW9VmCgNtk2zoEy0UgWcxA+4qR63rTu9U:MDI6OlZ/3OgjQKHdz19WJ+dQ3b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 882959554fe574a0c9e8dc94e0ec1d18_mafia_JC.exe
Files
-
882959554fe574a0c9e8dc94e0ec1d18_mafia_JC.exe.exe windows x86
38964fb07626f8c97b556fe092e44617
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
socket
closesocket
WSAStartup
WSACleanup
send
connect
htons
sendto
recv
gethostbyname
psapi
GetModuleBaseNameA
EnumProcesses
urlmon
URLDownloadToFileA
kernel32
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetSystemTimeAsFileTime
GetComputerNameA
CreateFileA
FindResourceA
FreeResource
FreeLibrary
LoadResource
HeapAlloc
HeapFree
GetTickCount
GetProcessHeap
ExpandEnvironmentStringsA
CreateRemoteThread
GetWindowsDirectoryA
WriteFile
WriteConsoleW
GetVolumeInformationA
Sleep
SizeofResource
GetFileAttributesA
CreateProcessA
GetEnvironmentVariableA
GetLastError
lstrcmpiA
GetProcAddress
CopyFileA
SetFileAttributesA
VirtualAllocEx
LoadLibraryA
LockResource
GetSystemInfo
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
GetVersionExA
CloseHandle
GetTempPathA
WriteProcessMemory
CreateThread
lstrlenA
SetErrorMode
SetEndOfFile
ReadFile
OpenProcess
GetCurrentProcessId
QueryPerformanceCounter
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
CreateFileW
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RaiseException
RtlUnwind
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
LoadLibraryW
GetLocaleInfoW
GetStdHandle
GetModuleFileNameW
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
Sections
.text Size: 143KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ