General
-
Target
ccd057bfd149aed3748fa9fa4c9aa5e14244f39eb42f3998f34c45781dba8ccb
-
Size
263KB
-
Sample
220606-ljfzzabdfl
-
MD5
24f9149af92f94c5abdf54a015a1b77a
-
SHA1
344490bdd4f761a90f16e591ed9a2405e6eb5901
-
SHA256
ccd057bfd149aed3748fa9fa4c9aa5e14244f39eb42f3998f34c45781dba8ccb
-
SHA512
36d8ae7cc4c80c9755cf838eaf45370aa4a758127105a81e4536fa1e53798f1068569ac17d541d823eae7d728b45d0494b26f533d4623ede1126dff6a36dad1e
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
ccd057bfd149aed3748fa9fa4c9aa5e14244f39eb42f3998f34c45781dba8ccb
-
Size
263KB
-
MD5
24f9149af92f94c5abdf54a015a1b77a
-
SHA1
344490bdd4f761a90f16e591ed9a2405e6eb5901
-
SHA256
ccd057bfd149aed3748fa9fa4c9aa5e14244f39eb42f3998f34c45781dba8ccb
-
SHA512
36d8ae7cc4c80c9755cf838eaf45370aa4a758127105a81e4536fa1e53798f1068569ac17d541d823eae7d728b45d0494b26f533d4623ede1126dff6a36dad1e
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-