Static task
static1
Behavioral task
behavioral1
Sample
2024-05-01_ea5892e4a94f659e3fffd8d8bb0120a7_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-01_ea5892e4a94f659e3fffd8d8bb0120a7_mafia.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-01_ea5892e4a94f659e3fffd8d8bb0120a7_mafia
-
Size
167KB
-
MD5
ea5892e4a94f659e3fffd8d8bb0120a7
-
SHA1
e8b7a0be743598e2bb600fdd08eb42c0d51d3dc2
-
SHA256
51dbd7c859c5ee2992dc5182fed49ce4756ae86649a27c49ea3cf2f1d25dc533
-
SHA512
582d88f682aebacd9b3bb1e2785bda2f749033b812f2bd2f98a577e1d00850d94bb96f7882aa889098c31e8099f8c7b86fcab620eee12aa72f4f0620a1b6dd27
-
SSDEEP
3072:n1XDAOI96PeTCrsIwZle2+09chAoXfHI7ULDlR:n9D5I0PPr1QU0alkAj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-01_ea5892e4a94f659e3fffd8d8bb0120a7_mafia
Files
-
2024-05-01_ea5892e4a94f659e3fffd8d8bb0120a7_mafia.exe windows:5 windows x86 arch:x86
79cfbdbc7c4bf3634cae3442f3fda1c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
GetProcAddress
GetModuleHandleA
FreeLibrary
lstrcpyA
GetComputerNameA
LoadLibraryA
LoadLibraryExA
GetConsoleWindow
FormatMessageA
lstrlenA
InitializeCriticalSection
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
SetConsoleTextAttribute
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
EnterCriticalSection
WideCharToMultiByte
MultiByteToWideChar
SetLastError
CloseHandle
CreateFileA
FindClose
FindNextFileA
InterlockedIncrement
InterlockedDecrement
Sleep
InterlockedExchange
EncodePointer
DecodePointer
HeapFree
RaiseException
GetModuleFileNameA
GetModuleHandleW
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileExA
GetCommandLineA
HeapSetInformation
WriteConsoleW
GetFileType
GetModuleFileNameW
GetSystemTimeAsFileTime
LCMapStringW
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
GetLocaleInfoW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeW
HeapReAlloc
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetStdHandle
GetTimeZoneInformation
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
GetProcessHeap
CreateFileW
OutputDebugStringA
VerLanguageNameA
lstrcpynA
RtlUnwind
GetLastError
LocalAlloc
user32
wsprintfA
LoadStringA
advapi32
DeregisterEventSource
RegisterEventSourceA
ReportEventA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegConnectRegistryA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ