Static task
static1
Behavioral task
behavioral1
Sample
2024-03-13_327443064c75ba44a07adfdeaeb23743_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_327443064c75ba44a07adfdeaeb23743_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_327443064c75ba44a07adfdeaeb23743_mafia
-
Size
611KB
-
MD5
327443064c75ba44a07adfdeaeb23743
-
SHA1
dd74f09f0a59a3140a7b7ab6f8bfad960aed5cc2
-
SHA256
f4368d6df59f3ba1c6c7b4eb6be69b4ca10de016b46f974afed2a8afbf83a5a3
-
SHA512
4efc9009fbe018376838b5836ead3cff1a098754d09460e19c8bc5a49aaf813d7954598acaf5f67042ec0bf7d8daaa01e99d458204f4731855cea19d7f65b801
-
SSDEEP
12288:Go0xdZVFMdkW9hWiCnzfP8ujNPS0J72vdH63m+xKcITAvqCtH:3cTVsP9hzwDVjNPS0J72M3m+x6TPWH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_327443064c75ba44a07adfdeaeb23743_mafia
Files
-
2024-03-13_327443064c75ba44a07adfdeaeb23743_mafia.exe windows:5 windows x86 arch:x86
7153025b367e52ce6ac12fce384033e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
ShowWindow
ws2_32
select
__WSAFDIsSet
recv
send
connect
accept
listen
ioctlsocket
setsockopt
bind
closesocket
recvfrom
sendto
getaddrinfo
freeaddrinfo
htons
htonl
WSAStartup
socket
kernel32
GetACP
GetCurrentDirectoryA
GetProcessHeap
SetEndOfFile
CreateFileW
CreateFileA
SetEnvironmentVariableA
CompareStringW
SetStdHandle
WriteConsoleW
LoadLibraryW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapReAlloc
GetStringTypeW
GetCurrentProcessId
GetTickCount
GetEnvironmentStringsW
OutputDebugStringA
CreateThread
WaitForSingleObject
Sleep
InitializeCriticalSection
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
FindClose
FindFirstFileA
DeleteCriticalSection
FindNextFileA
GetConsoleWindow
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
GetLastError
CreateDirectoryA
GetDriveTypeW
GetFullPathNameA
DeleteFileA
MoveFileA
GetTimeFormatA
GetDateFormatA
HeapFree
GetCommandLineA
HeapSetInformation
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
SetCurrentDirectoryA
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetLocaleInfoW
GetTimeZoneInformation
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapCreate
ReadFile
SetFilePointer
CloseHandle
GetCurrentDirectoryW
GetModuleFileNameA
FreeEnvironmentStringsW
Sections
.text Size: 434KB - Virtual size: 433KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ