General
-
Target
c9d878af39e8276e4445bdfed7b4d277f8f4e497caad70d5e47777fef0f57fc8
-
Size
308KB
-
Sample
220619-crqdyacfar
-
MD5
52ddf64233c381141634cd873a26a06c
-
SHA1
41e9454302709ff6b87aa7c963e0f411dced635d
-
SHA256
c9d878af39e8276e4445bdfed7b4d277f8f4e497caad70d5e47777fef0f57fc8
-
SHA512
36b4cdec31ce48a0deddb156aa4c8ce1f04579c4ccbfe1a7f6f248607d575e7fd95df9fe56924c8af04b693dc41f2104090392ebaa072ba92fc74561d4a8234f
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
c9d878af39e8276e4445bdfed7b4d277f8f4e497caad70d5e47777fef0f57fc8
-
Size
308KB
-
MD5
52ddf64233c381141634cd873a26a06c
-
SHA1
41e9454302709ff6b87aa7c963e0f411dced635d
-
SHA256
c9d878af39e8276e4445bdfed7b4d277f8f4e497caad70d5e47777fef0f57fc8
-
SHA512
36b4cdec31ce48a0deddb156aa4c8ce1f04579c4ccbfe1a7f6f248607d575e7fd95df9fe56924c8af04b693dc41f2104090392ebaa072ba92fc74561d4a8234f
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-