Behavioral task
behavioral1
Sample
2024-03-05_4782445bbada7a6e3a77fe4c8b4406f3_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_4782445bbada7a6e3a77fe4c8b4406f3_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_4782445bbada7a6e3a77fe4c8b4406f3_mafia
-
Size
432KB
-
MD5
4782445bbada7a6e3a77fe4c8b4406f3
-
SHA1
1e1510a675f7e32a7a6841d82536e3847957c35d
-
SHA256
5c7f5edfa9918d6d86c11e9ec1d8ab705ceafdaeffcb9e7066a8d7eba040f267
-
SHA512
fb63815d6131e93eedde8846af8ba677d18ab5f81a0dc58ed92fef0477bcd456bb26d9efb37c7c96db36906cce7b4ef70aa2809387bfbe789c4e5ea032ea8872
-
SSDEEP
6144:cDZmBlZ87p0vRhZ/u8AfjVO0M9qm9YOTjOYRGXhMNOcM:cDZmBi0BA7g0Wqm9TjOYRGa9M
Malware Config
Signatures
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-05_4782445bbada7a6e3a77fe4c8b4406f3_mafia
Files
-
2024-03-05_4782445bbada7a6e3a77fe4c8b4406f3_mafia.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 249KB - Virtual size: 249KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ