Behavioral task
behavioral1
Sample
2024-03-06_de42fea7936a687d993a51dd2b0fddd4_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-06_de42fea7936a687d993a51dd2b0fddd4_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-06_de42fea7936a687d993a51dd2b0fddd4_mafia
-
Size
452KB
-
MD5
de42fea7936a687d993a51dd2b0fddd4
-
SHA1
a6cbd908ab3f5c759cf6f0ebc092d43c21ade171
-
SHA256
1a41c83a0fb39a18d054bc59b536a3581f65c6c625e76450bf8c8aa542a293ce
-
SHA512
cd011ff7d06b765375e501612ae03b2160cc7512c9de188b3156f8ea4a57057e385d329b7b891c018ac34450aa60918a92ca4c45b373cb51cf0af245311d9d2a
-
SSDEEP
6144:FjZi5dyACB0iCHcbk8ukYGFOg1i5+vEzhLJqNU:FjZgyAmk8uBGYg1i5+vEJJq
Malware Config
Signatures
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-06_de42fea7936a687d993a51dd2b0fddd4_mafia
Files
-
2024-03-06_de42fea7936a687d993a51dd2b0fddd4_mafia.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 245KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ