General
-
Target
d998da1962809369fe3d264130ac9bc4c3916fd63ef2ed6e797aac003b304598
-
Size
186KB
-
Sample
220923-vjbjxsahfn
-
MD5
8396cca808a01ea5121a1cf97dafbe58
-
SHA1
a1368cdbf6cfc97b085c800563361bf4510254ae
-
SHA256
d998da1962809369fe3d264130ac9bc4c3916fd63ef2ed6e797aac003b304598
-
SHA512
6d5bdfe793d9f2426c4341b99c076098506a803eb7d63d9f4c28d4c483dd4ab6eaadf09b7a8ec413aceb671620ac0da8e7822e3397888912497caff6ded6fa59
-
SSDEEP
3072:6aw0PvLXesOP55dt6pfMp38HCAUaWEBgDEs/PkD4n:vvLXO9tuVHDUaW
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
d998da1962809369fe3d264130ac9bc4c3916fd63ef2ed6e797aac003b304598
-
Size
186KB
-
MD5
8396cca808a01ea5121a1cf97dafbe58
-
SHA1
a1368cdbf6cfc97b085c800563361bf4510254ae
-
SHA256
d998da1962809369fe3d264130ac9bc4c3916fd63ef2ed6e797aac003b304598
-
SHA512
6d5bdfe793d9f2426c4341b99c076098506a803eb7d63d9f4c28d4c483dd4ab6eaadf09b7a8ec413aceb671620ac0da8e7822e3397888912497caff6ded6fa59
-
SSDEEP
3072:6aw0PvLXesOP55dt6pfMp38HCAUaWEBgDEs/PkD4n:vvLXO9tuVHDUaW
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-