General
-
Target
d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5
-
Size
187KB
-
Sample
220923-yqhhlabcbn
-
MD5
ecf7961c555776326dbf06a6fdd12454
-
SHA1
9cf0c35e29c6cd70cc7ca99963d7e610ff86bf8a
-
SHA256
d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5
-
SHA512
d23a82a93220b036316fc43030d3e4a1410675db7ca7796c7024d8aebc70a164c0ed68bbd6e7742a83a5ce7248371f34f7fc483ed5b10f19df754bdd1ddfff1b
-
SSDEEP
3072:zkXgA1L2GgJ/5Ai5DHHlxKW4DlPLya5G+sRB51gA/Pk44x:aL2JdnTUDlPLyqGf1g
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5
-
Size
187KB
-
MD5
ecf7961c555776326dbf06a6fdd12454
-
SHA1
9cf0c35e29c6cd70cc7ca99963d7e610ff86bf8a
-
SHA256
d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5
-
SHA512
d23a82a93220b036316fc43030d3e4a1410675db7ca7796c7024d8aebc70a164c0ed68bbd6e7742a83a5ce7248371f34f7fc483ed5b10f19df754bdd1ddfff1b
-
SSDEEP
3072:zkXgA1L2GgJ/5Ai5DHHlxKW4DlPLya5G+sRB51gA/Pk44x:aL2JdnTUDlPLyqGf1g
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-