General
-
Target
deb1f4459809c0f3d65beb7b7d3e78c9
-
Size
10.3MB
-
Sample
220809-zzcjdahhg4
-
MD5
deb1f4459809c0f3d65beb7b7d3e78c9
-
SHA1
8f630047a5ada490d8807daa45495f0d757f4e2f
-
SHA256
00497a054321b4229b74779168c2d451c6df7e41b8016951c1c95ad9f2fd374a
-
SHA512
53d4352cb5c5d1096822692ba1a4f4a6e64bd45c3530469d5e075118d7847b2de4a50230b8b494b26adbf3f04ce736f5531d1a0b0b26b0c01fe507fea7049db7
Static task
static1
Behavioral task
behavioral1
Sample
deb1f4459809c0f3d65beb7b7d3e78c9.exe
Resource
win7-20220715-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
deb1f4459809c0f3d65beb7b7d3e78c9
-
Size
10.3MB
-
MD5
deb1f4459809c0f3d65beb7b7d3e78c9
-
SHA1
8f630047a5ada490d8807daa45495f0d757f4e2f
-
SHA256
00497a054321b4229b74779168c2d451c6df7e41b8016951c1c95ad9f2fd374a
-
SHA512
53d4352cb5c5d1096822692ba1a4f4a6e64bd45c3530469d5e075118d7847b2de4a50230b8b494b26adbf3f04ce736f5531d1a0b0b26b0c01fe507fea7049db7
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-