Behavioral task
behavioral1
Sample
2024-05-24_7dfaa03ca8e272574e457c53edb45bbf_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_7dfaa03ca8e272574e457c53edb45bbf_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-24_7dfaa03ca8e272574e457c53edb45bbf_mafia
-
Size
349KB
-
MD5
7dfaa03ca8e272574e457c53edb45bbf
-
SHA1
bf12de757c4244dab24621dfb2cdb4ba501bb82b
-
SHA256
70068a5deb3aaff4803ea43e1e7a16285042d484263cd6a702474cdecc1539d9
-
SHA512
0abf488e8269c70c68ff415305f2728f249eb706c69b5cb785cec73ce490d460a508ce5c6d5f80a9da05d438d12867caae1007bb0070271aa055e99d364571fa
-
SSDEEP
6144:k+jfY43T97LNTJQnzkr5meQzK0uY5CYM3nyYSJvBxma+L6zYUPyBt4g9Y:k+jffT97LNJQnzkr5meQzK0uuCYMCnzj
Malware Config
Signatures
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Vidar family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2024-05-24_7dfaa03ca8e272574e457c53edb45bbf_mafia
Files
-
2024-05-24_7dfaa03ca8e272574e457c53edb45bbf_mafia.exe windows:5 windows x86 arch:x86
b72cbc79fc1fead86b580f2d8c254198
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetProcAddress
LoadLibraryA
FindFirstFileW
GetProcessHeap
SetEndOfFile
CreateFileW
FindNextFileW
HeapAlloc
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetLastError
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
ReadFile
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CloseHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
LoadLibraryW
SetStdHandle
WriteConsoleW
CreateFileA
crypt32
CryptStringToBinaryA
Sections
.text Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ