Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_083e6e594a2ebd9a11cc4345a9495fe8_gazer_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_083e6e594a2ebd9a11cc4345a9495fe8_gazer_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_083e6e594a2ebd9a11cc4345a9495fe8_gazer_mafia
-
Size
547KB
-
MD5
083e6e594a2ebd9a11cc4345a9495fe8
-
SHA1
4e601b264769e903221563f7fde2397d7280168d
-
SHA256
858d6f83169857339977840fb2a570c23cdf84659e60a04bc9d97c9eaf8c3e2c
-
SHA512
08ca311ffb39729e1af4c50466682b1230b084da7686d9a7422388fd9927f1d3389c8fb79f401310acfe9d6604e6f78f3f385beda116e9e26c2b7f0ddaaaedad
-
SSDEEP
12288:TXHaSa7dwiq4R9dZGOzYKyE66JjzOMIzKqAD:TXHkwiqK/M0sEBjSMIzKqy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-24_083e6e594a2ebd9a11cc4345a9495fe8_gazer_mafia
Files
-
2024-01-24_083e6e594a2ebd9a11cc4345a9495fe8_gazer_mafia.exe windows:5 windows x86 arch:x86
9db0761ee75acb079bae0347fe7079ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GetCurrentProcess
SetHandleInformation
GetTickCount
WriteFile
ReadFile
GetStdHandle
SetLastError
LoadLibraryA
LeaveCriticalSection
TerminateProcess
EnterCriticalSection
GetSystemTime
QueryPerformanceCounter
Sleep
CreateThread
CreateFileA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
FormatMessageA
CloseHandle
OutputDebugStringA
GetModuleFileNameA
CreateEventW
GetLastError
InitializeCriticalSectionAndSpinCount
WriteConsoleW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileAttributesA
GetProcessHeap
SetEndOfFile
SetStdHandle
GetModuleFileNameW
GetLocaleInfoW
LoadLibraryW
HeapSize
FlushFileBuffers
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
HeapFree
GetModuleHandleW
ExitProcess
GetFileType
CreateFileW
ExitThread
ResumeThread
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStartupInfoW
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
SetFilePointer
GetConsoleCP
advapi32
CryptReleaseContext
CryptAcquireContextW
ReportEventA
DeregisterEventSource
RegisterEventSourceA
CryptGenRandom
ws2_32
ioctlsocket
connect
inet_ntoa
WSAStartup
recvfrom
ntohl
htonl
select
WSAGetLastError
htons
ntohs
getsockname
getpeername
setsockopt
sendto
recv
bind
socket
__WSAFDIsSet
closesocket
send
listen
accept
getsockopt
Sections
.text Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ