General
-
Target
file.exe
-
Size
255KB
-
Sample
221025-xemgqsdedm
-
MD5
cde46c161a2dfc40f2ca20b38cf0e54e
-
SHA1
742d8370e4c94008266b178016ca7046a35e8288
-
SHA256
5cc838c12947858530e9fa993021ff8c315f34a44028dd4496e660b263552cb2
-
SHA512
6cb25de60894a933251dcc120d7b02771efac7203bbde1de297618dfaff084dc7c2e7aa0473609e49b815310488f0972f6b1d35c91bb4ea9f0d1ddd5196c6a95
-
SSDEEP
3072:jXVuqzlk8LMSKipBeTPe8eRWScjvqd3rKyrvzTMNgGWra:bUk/L+ABeTPe8dJitKy3Ynaa
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
255KB
-
MD5
cde46c161a2dfc40f2ca20b38cf0e54e
-
SHA1
742d8370e4c94008266b178016ca7046a35e8288
-
SHA256
5cc838c12947858530e9fa993021ff8c315f34a44028dd4496e660b263552cb2
-
SHA512
6cb25de60894a933251dcc120d7b02771efac7203bbde1de297618dfaff084dc7c2e7aa0473609e49b815310488f0972f6b1d35c91bb4ea9f0d1ddd5196c6a95
-
SSDEEP
3072:jXVuqzlk8LMSKipBeTPe8eRWScjvqd3rKyrvzTMNgGWra:bUk/L+ABeTPe8dJitKy3Ynaa
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-