General
-
Target
2024-06-10_e7fcc0abb44c101cd44abd13a87b1eb7_mafia
-
Size
1015KB
-
Sample
240610-kn2a2afc68
-
MD5
e7fcc0abb44c101cd44abd13a87b1eb7
-
SHA1
2cb83e70afb1184b05268a21ed217c825ead7dfa
-
SHA256
e1379d63e95a15975b870fa3c3d8b3cb139d5bd9001f709d7a342466d5d70d94
-
SHA512
9241fb33e6470e1155dc3d0c878aba08661cf2b4ad31c5764686023afd78d6560efb4ea8a7f7202a051be3f879da02ba6cf9968e0107bad03a8d50bf2f97eb61
-
SSDEEP
24576:JaXNJQVJvxC3ZHobLzB/3gQvExFpdhC55AKDqsc53vTkO/1e:jJvCZI7B/gkUrMvLqscVF/g
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_e7fcc0abb44c101cd44abd13a87b1eb7_mafia.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-10_e7fcc0abb44c101cd44abd13a87b1eb7_mafia.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-10_e7fcc0abb44c101cd44abd13a87b1eb7_mafia
-
Size
1015KB
-
MD5
e7fcc0abb44c101cd44abd13a87b1eb7
-
SHA1
2cb83e70afb1184b05268a21ed217c825ead7dfa
-
SHA256
e1379d63e95a15975b870fa3c3d8b3cb139d5bd9001f709d7a342466d5d70d94
-
SHA512
9241fb33e6470e1155dc3d0c878aba08661cf2b4ad31c5764686023afd78d6560efb4ea8a7f7202a051be3f879da02ba6cf9968e0107bad03a8d50bf2f97eb61
-
SSDEEP
24576:JaXNJQVJvxC3ZHobLzB/3gQvExFpdhC55AKDqsc53vTkO/1e:jJvCZI7B/gkUrMvLqscVF/g
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-