Resubmissions

08/04/2025, 14:11

250408-rhjmcsvp15 10

22/03/2025, 06:18

250322-g2ywaay1fy 10

Analysis

  • max time kernel
    109s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 14:11

General

  • Target

    f89219b77e5fde5a7a1581e3e4cc0b00.exe

  • Size

    294KB

  • MD5

    f89219b77e5fde5a7a1581e3e4cc0b00

  • SHA1

    557c9ff996b42056c0531e63ebf5e7d794b23b19

  • SHA256

    6c8d0a52686544703953357f4d7655e5e1a27a90e2f1aeac9eccdddb618333e5

  • SHA512

    9ba62300e547e971ff79e4ec0209e07197414071ddf0b90d4a951e06a82f258ab2abcd9653b5fdeb5febe9b6fc8b6a28ce52f7360d94b63283fd0485168b6a40

  • SSDEEP

    3072:bC6UBkwelNBVB18I8qk49NWa+miRztQYi+GVnkgLmVv3yniVH9T2mZP:bdHvH8+k49wa+LRBQYi+OkgKLVH9T2m

Malware Config

Signatures

  • Detect MafiaWare666 ransomware 1 IoCs
  • MafiaWare666 Ransomware

    MafiaWare666 is ransomware written in C# with multiple variants.

  • Mafiaware666 family
  • Renames multiple (128) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f89219b77e5fde5a7a1581e3e4cc0b00.exe
    "C:\Users\Admin\AppData\Local\Temp\f89219b77e5fde5a7a1581e3e4cc0b00.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    PID:5300

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5300-0-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

    Filesize

    4KB

  • memory/5300-1-0x0000000000170000-0x00000000001BE000-memory.dmp

    Filesize

    312KB

  • memory/5300-2-0x0000000005130000-0x00000000056D4000-memory.dmp

    Filesize

    5.6MB

  • memory/5300-3-0x0000000004B80000-0x0000000004C12000-memory.dmp

    Filesize

    584KB

  • memory/5300-4-0x0000000004C40000-0x0000000004C4A000-memory.dmp

    Filesize

    40KB

  • memory/5300-5-0x0000000074CC0000-0x0000000075470000-memory.dmp

    Filesize

    7.7MB

  • memory/5300-6-0x0000000074CC0000-0x0000000075470000-memory.dmp

    Filesize

    7.7MB

  • memory/5300-26-0x0000000074CCE000-0x0000000074CCF000-memory.dmp

    Filesize

    4KB

  • memory/5300-30-0x0000000074CC0000-0x0000000075470000-memory.dmp

    Filesize

    7.7MB

  • memory/5300-33-0x0000000074CC0000-0x0000000075470000-memory.dmp

    Filesize

    7.7MB