General
-
Target
2024-10-09_315506db2635d8bd616315c99537776a_mafia
-
Size
11.4MB
-
Sample
241009-rrnyfa1ekh
-
MD5
315506db2635d8bd616315c99537776a
-
SHA1
8ec2cd8fd34e0ea5224fa9d233dab9ae3404e22e
-
SHA256
f7b0ab8b8145a5455631cfe76a35be69d126989c5db08e879f2b6056eb910141
-
SHA512
4117266d0992acb28d54f5a5e66248d8829ea40b61fe4aca3964fbad600c4af7de2fac577eae665f88f736706c9c32d5cd361b3a353335f480ca5b1727f6a946
-
SSDEEP
12288:PVbj7zJB99tzBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBv:PJzXd
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-09_315506db2635d8bd616315c99537776a_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-09_315506db2635d8bd616315c99537776a_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Targets
-
-
Target
2024-10-09_315506db2635d8bd616315c99537776a_mafia
-
Size
11.4MB
-
MD5
315506db2635d8bd616315c99537776a
-
SHA1
8ec2cd8fd34e0ea5224fa9d233dab9ae3404e22e
-
SHA256
f7b0ab8b8145a5455631cfe76a35be69d126989c5db08e879f2b6056eb910141
-
SHA512
4117266d0992acb28d54f5a5e66248d8829ea40b61fe4aca3964fbad600c4af7de2fac577eae665f88f736706c9c32d5cd361b3a353335f480ca5b1727f6a946
-
SSDEEP
12288:PVbj7zJB99tzBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBv:PJzXd
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2