General
-
Target
b5b87ea78993944a356f1b88b53b63a276acfe871ab7336dbc81dd0999a8d5fc
-
Size
262KB
-
Sample
220606-ehf51sacdl
-
MD5
b1e7605bf0fe57d5cc5b0e57a7469a88
-
SHA1
5e84a385b3458cacc7aa05f80b202e7557337e40
-
SHA256
b5b87ea78993944a356f1b88b53b63a276acfe871ab7336dbc81dd0999a8d5fc
-
SHA512
fa7440a23e00cc7cd9396a1237cbc650c2d84482ed85575a54ae092300d09d2482b5205af07ff76baab2e3a7cbe07aad6dccf323d058427fce5855fe6b0f8a83
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
b5b87ea78993944a356f1b88b53b63a276acfe871ab7336dbc81dd0999a8d5fc
-
Size
262KB
-
MD5
b1e7605bf0fe57d5cc5b0e57a7469a88
-
SHA1
5e84a385b3458cacc7aa05f80b202e7557337e40
-
SHA256
b5b87ea78993944a356f1b88b53b63a276acfe871ab7336dbc81dd0999a8d5fc
-
SHA512
fa7440a23e00cc7cd9396a1237cbc650c2d84482ed85575a54ae092300d09d2482b5205af07ff76baab2e3a7cbe07aad6dccf323d058427fce5855fe6b0f8a83
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-