General
-
Target
314f4da13b3a43ce3eddacf01d850f36.exe
-
Size
307KB
-
Sample
220605-kjqczadfaq
-
MD5
314f4da13b3a43ce3eddacf01d850f36
-
SHA1
5f70d85a6bf37e5106a099040c658a77e7003b16
-
SHA256
1cfe393c560cf7e17905bb2573ece065ffd587ffe3ec5efbbb43b326a39e3d51
-
SHA512
2336c9af1ad364435ad7b5666727d60092f03a7ca15d4e655ffad5837caf06639286f9a3edc5cfbfa9b4c79e7cd4c6f97f8fe136e98e45250e90a96e3a714014
Static task
static1
Behavioral task
behavioral1
Sample
314f4da13b3a43ce3eddacf01d850f36.exe
Resource
win7-20220414-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
314f4da13b3a43ce3eddacf01d850f36.exe
-
Size
307KB
-
MD5
314f4da13b3a43ce3eddacf01d850f36
-
SHA1
5f70d85a6bf37e5106a099040c658a77e7003b16
-
SHA256
1cfe393c560cf7e17905bb2573ece065ffd587ffe3ec5efbbb43b326a39e3d51
-
SHA512
2336c9af1ad364435ad7b5666727d60092f03a7ca15d4e655ffad5837caf06639286f9a3edc5cfbfa9b4c79e7cd4c6f97f8fe136e98e45250e90a96e3a714014
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-