General
-
Target
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925
-
Size
308KB
-
Sample
220605-nsl9fsecgk
-
MD5
2841b7ce1412fa3c2c1049d6e338adba
-
SHA1
f6446ce732b57e17454311474916b2d3a6affaf9
-
SHA256
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925
-
SHA512
02613e1700308df77b901c39c1f0635683d16b5fc29e23ac6bf72d275e09a80bde17b0d47cb77eb7a6c1992c11aa4e60a50efd990b46b881f77f567536e9a9ec
Static task
static1
Behavioral task
behavioral1
Sample
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925.exe
Resource
win10-20220414-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925
-
Size
308KB
-
MD5
2841b7ce1412fa3c2c1049d6e338adba
-
SHA1
f6446ce732b57e17454311474916b2d3a6affaf9
-
SHA256
bfdac82979537985b490258fb70febdb94c3f4f6628d8ab16826eae3991bc925
-
SHA512
02613e1700308df77b901c39c1f0635683d16b5fc29e23ac6bf72d275e09a80bde17b0d47cb77eb7a6c1992c11aa4e60a50efd990b46b881f77f567536e9a9ec
-
XMRig Miner Payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-