General
-
Target
73062ad4b7f5e6de91a6937939ee1304198734a42570a563a5d78b6892f301bc
-
Size
183KB
-
Sample
220612-vqsf1sghbm
-
MD5
8837292204de81ca5d7a87cdf3773c76
-
SHA1
d81ff7c461d29ef3ca2a5837569bb6f3fda5bf45
-
SHA256
73062ad4b7f5e6de91a6937939ee1304198734a42570a563a5d78b6892f301bc
-
SHA512
119533670f4c64ef9104d953ba7a887dc7019fb43e1e34a97ca46b580a0fdb958106cbdb0ed4a72c0f1f73230341e3dccd75fabb23a00387714ae15c2fee8918
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
73062ad4b7f5e6de91a6937939ee1304198734a42570a563a5d78b6892f301bc
-
Size
183KB
-
MD5
8837292204de81ca5d7a87cdf3773c76
-
SHA1
d81ff7c461d29ef3ca2a5837569bb6f3fda5bf45
-
SHA256
73062ad4b7f5e6de91a6937939ee1304198734a42570a563a5d78b6892f301bc
-
SHA512
119533670f4c64ef9104d953ba7a887dc7019fb43e1e34a97ca46b580a0fdb958106cbdb0ed4a72c0f1f73230341e3dccd75fabb23a00387714ae15c2fee8918
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-