Behavioral task
behavioral1
Sample
2024-10-18_45cb65ab764f05f26990edfe62e39169_cobalt-strike_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-18_45cb65ab764f05f26990edfe62e39169_cobalt-strike_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_45cb65ab764f05f26990edfe62e39169_cobalt-strike_mafia
-
Size
574KB
-
MD5
45cb65ab764f05f26990edfe62e39169
-
SHA1
fee5ed137b340a6ebd693177a190b50f5936c6bb
-
SHA256
5121a59b2b26e34094b016429ef97e4e29077671b0670f0092e23e7c57b19982
-
SHA512
d1e9e8daf1652118b88ed30a70bd869fd335082b99aafab096a8d8053ad48d326f1dbdd1318393a96867b993d0d46e52769d904e26b3b14d4844edca9f24f8d6
-
SSDEEP
12288:qrMlFbctnITNE2i3KghRiAqqUEGq60dKdxL0VYExdZaZM4S:qAbcqE2i3KghRiAqqUEGq6AKdx5OG
Malware Config
Extracted
vidar
c0c7c802c4ec94ab4c7fcd88c588698c
Signatures
Files
-
2024-10-18_45cb65ab764f05f26990edfe62e39169_cobalt-strike_mafia.exe windows:6 windows x86 arch:x86
d10af643340e1121562abe3e6bd5b0e1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AttachConsole
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
CreateFileW
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapAlloc
HeapFree
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileSizeEx
SetFilePointerEx
CloseHandle
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
ReadConsoleW
HeapSize
WriteConsoleW
Sections
.text Size: 132KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 393KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ