Analysis

  • max time kernel
    105s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2025, 05:10

General

  • Target

    2025-04-18_ea166f4158d25f89cc3a981d2a11716a_elex_mafia.exe

  • Size

    663KB

  • MD5

    ea166f4158d25f89cc3a981d2a11716a

  • SHA1

    bc304f0d229514641f128d39a8874baab2b431a5

  • SHA256

    49ba307f7944785fe7257ea4861df718886a46578d9ab0676a36370fc6fb6426

  • SHA512

    47a53a031cf1313f52a68c9ec96f081d11fae95ad938c4451daf3860e76756b579d0833fcac40d98a9c1a3e5361a323d964cffeb1512f251f0fc29504c9a5e9d

  • SSDEEP

    12288:7/kgGFtCmG6snYOcQ78MCkSPzUNQmzUH5xFnGufXfkQgbY:7cgGFEKsnGQ7nCBPzU3zo9hcTE

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-18_ea166f4158d25f89cc3a981d2a11716a_elex_mafia.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-18_ea166f4158d25f89cc3a981d2a11716a_elex_mafia.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5380 -s 460
      2⤵
      • Program crash
      PID:1952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5380 -ip 5380
    1⤵
      PID:6104

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5380-0-0x0000000000BAB000-0x0000000000BDB000-memory.dmp

      Filesize

      192KB

    • memory/5380-1-0x0000000000B00000-0x0000000000BDB000-memory.dmp

      Filesize

      876KB

    • memory/5380-2-0x0000000000BAB000-0x0000000000BDB000-memory.dmp

      Filesize

      192KB

    • memory/5380-3-0x0000000000B00000-0x0000000000BDB000-memory.dmp

      Filesize

      876KB