General
-
Target
d7e0bfa33b1989728b6a5ebdb51a5009403dff031ef23597f0723b179b86dfe4
-
Size
306KB
-
Sample
220619-scl1zahdg4
-
MD5
aeb1e223fffe3774b5eb183f44f10acc
-
SHA1
f74a58f39acd849d9797a0820b5207b794e2ed29
-
SHA256
d7e0bfa33b1989728b6a5ebdb51a5009403dff031ef23597f0723b179b86dfe4
-
SHA512
aeeae0d134fab71775a40f2405df28a847d5c259d9896a50765d002e7352e522658bd8beef1f05907b0d3fc59ed07cb426ac45fd2d8aa123256e4c0c326c5db1
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
d7e0bfa33b1989728b6a5ebdb51a5009403dff031ef23597f0723b179b86dfe4
-
Size
306KB
-
MD5
aeb1e223fffe3774b5eb183f44f10acc
-
SHA1
f74a58f39acd849d9797a0820b5207b794e2ed29
-
SHA256
d7e0bfa33b1989728b6a5ebdb51a5009403dff031ef23597f0723b179b86dfe4
-
SHA512
aeeae0d134fab71775a40f2405df28a847d5c259d9896a50765d002e7352e522658bd8beef1f05907b0d3fc59ed07cb426ac45fd2d8aa123256e4c0c326c5db1
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-