Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_beba5bac63048b415fb766bc6a5bef75_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-23_beba5bac63048b415fb766bc6a5bef75_mafia.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_beba5bac63048b415fb766bc6a5bef75_mafia
-
Size
721KB
-
MD5
beba5bac63048b415fb766bc6a5bef75
-
SHA1
1dd106fabad9392ffb512aa1dfd44a3665dc8fb8
-
SHA256
44a1b59b484547ee39946670a2ea30f1416f6a6f3bde3f6be1b82e0fcbb19c81
-
SHA512
46e77807c2d864d634681455135abf4990467b94bad4bc14acecf8d7e948571931978b65fc3277faea331fe0a721948df3f841300cf10c1f9e7ef782d7062548
-
SSDEEP
12288:EECi/lDRDGIcsd7nepE1o0NGWgUfgk07T9QehqZ6b6W1932D7xbkYs+G5Xmm5E1i:PCi/lDRlLkXGDKYe5XZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-05-23_beba5bac63048b415fb766bc6a5bef75_mafia
Files
-
2024-05-23_beba5bac63048b415fb766bc6a5bef75_mafia.exe windows:5 windows x86 arch:x86
a50d48d1d79bccb5f25ad87b586eb823
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
FindClose
FindFirstFileA
CopyFileA
SetFileAttributesA
FindNextFileA
GetTempPathA
CreateDirectoryA
DeleteFileA
GetCurrentDirectoryA
CloseHandle
CreateFileA
GetFileAttributesA
GetLastError
SetConsoleMode
ReadConsoleInputA
GetProcessHeap
SetEndOfFile
CreateFileW
SetStdHandle
WriteConsoleW
LoadLibraryW
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
RtlUnwind
RaiseException
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
HeapSetInformation
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
CompareStringW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
GetOEMCP
IsValidCodePage
IsProcessorFeaturePresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
ExitProcess
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointer
FlushFileBuffers
HeapCreate
HeapSize
GetModuleFileNameW
GetLocaleInfoW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
GetForegroundWindow
wininet
InternetErrorDlg
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetOptionA
InternetOpenA
HttpSendRequestA
InternetOpenUrlA
InternetQueryOptionA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
InternetConnectA
Sections
.text Size: 536KB - Virtual size: 535KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ