Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_2744888d43a238c26331e4cd72e03415_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-08_2744888d43a238c26331e4cd72e03415_mafia.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-08_2744888d43a238c26331e4cd72e03415_mafia
-
Size
16.1MB
-
MD5
2744888d43a238c26331e4cd72e03415
-
SHA1
9aa6cb8737c75f8d78f63288eae2c093ad4eb45e
-
SHA256
a3dd19e9ce26d4ff5b8a51ad17b3d18778e1b81f2816fd75e26da9625d58d40d
-
SHA512
82cec0be0d780e601aba2f41782b9a482a30ede3dbc44a16757a585ab3bb978584003955172497c9249e00e5705f8ef9cfed9bab0d94b594b581fabf984edb97
-
SSDEEP
196608:5Hp1u9YEIam4mARXlWBDxE7YfQaf+HDYhMfU8FBFWcguaSDWX4:5Hbu9YEk4mAD7Of+YhMnFWcgua/X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-08_2744888d43a238c26331e4cd72e03415_mafia
Files
-
2024-09-08_2744888d43a238c26331e4cd72e03415_mafia.exe windows:5 windows x86 arch:x86
08da5ec80406581b76eae64d14e4f631
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetModuleFileNameW
SetEnvironmentVariableW
IsWow64Process
GetCurrentProcess
GetCommandLineW
OpenProcess
GetLastError
DuplicateHandle
GetVersionExW
CreateFileW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CloseHandle
OpenFileMappingW
SetEvent
GetFileSizeEx
VirtualAlloc
VirtualFree
GetModuleHandleA
GetProcAddress
LoadLibraryW
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xcpad Size: - Virtual size: 1.7MB
.idata Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ