General
-
Target
13.php
-
Size
292KB
-
Sample
220731-fpq48shdb2
-
MD5
73dce3e7861a21a660c098f08fcd09fa
-
SHA1
2a555fece19e500f8c65e2b1e26fb6dbcd44981d
-
SHA256
3c38e00f572800dfdcf676a141e4b98903977368f8870cd29221b3320b640ed4
-
SHA512
9ffe934411c0f91a1e92884bfd455e6d0f1188ec5fb7368b134084008462a664ea438396d0161940ea6345e5952ae74dd9408c6f472eef46102890d50eb0fb50
Static task
static1
Behavioral task
behavioral1
Sample
13.exe
Resource
win7-20220715-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
13.php
-
Size
292KB
-
MD5
73dce3e7861a21a660c098f08fcd09fa
-
SHA1
2a555fece19e500f8c65e2b1e26fb6dbcd44981d
-
SHA256
3c38e00f572800dfdcf676a141e4b98903977368f8870cd29221b3320b640ed4
-
SHA512
9ffe934411c0f91a1e92884bfd455e6d0f1188ec5fb7368b134084008462a664ea438396d0161940ea6345e5952ae74dd9408c6f472eef46102890d50eb0fb50
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-