Behavioral task
behavioral1
Sample
2024-03-13_6a45bc6f34a6c6f811ec08ff58fdbaec_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-13_6a45bc6f34a6c6f811ec08ff58fdbaec_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-13_6a45bc6f34a6c6f811ec08ff58fdbaec_mafia
-
Size
472KB
-
MD5
6a45bc6f34a6c6f811ec08ff58fdbaec
-
SHA1
8a7ff9d34ca95a5ce752ddc8653bfa3cf23bf891
-
SHA256
f1c01aa90a2bad624f18f591fff27d454fdd8a185461d4b2e73a235f650ad6c4
-
SHA512
ff863ff02a7914e28679c0b1d2cae96b31e6f1f0d0dd047b6e489d509fceef5d0b44dbbdd96b7e8646bd4d945874f0f7ba0d38bc077b9794b4f2709bd7bec0be
-
SSDEEP
6144:nCyiXVZhMMOP/AXh/PP6IEWEonebA8mUG05UJKH2khp9j5kz+i9moRQBJg4Eahrf:ndiXZMbKCxWIW+kmoRQB24EyiPxIn
Malware Config
Signatures
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-13_6a45bc6f34a6c6f811ec08ff58fdbaec_mafia
Files
-
2024-03-13_6a45bc6f34a6c6f811ec08ff58fdbaec_mafia.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 251KB - Virtual size: 251KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ