General
-
Target
file.exe
-
Size
192KB
-
Sample
221026-pebfgaffen
-
MD5
e84412e1df23061845e100185a471bbe
-
SHA1
fb9b8cf7e46d901094ad9c610637c95db2e9644e
-
SHA256
313f19f727c2177dafa039021ff2c0006bfdd055419abce3267f076b7f1f3ecb
-
SHA512
d9d77484ed314e7581831314b725dacb64515fbf78fcd785574011c0e793c2cfc84881075b68ba547b537313564869c310b160bbe54e2983cdebbac221e2b842
-
SSDEEP
6144:kOO0pQqVWLiXJ+n/X2mwbTr4VjPQ0LFcn:5OwQwWmXJy2FTr4dy
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
192KB
-
MD5
e84412e1df23061845e100185a471bbe
-
SHA1
fb9b8cf7e46d901094ad9c610637c95db2e9644e
-
SHA256
313f19f727c2177dafa039021ff2c0006bfdd055419abce3267f076b7f1f3ecb
-
SHA512
d9d77484ed314e7581831314b725dacb64515fbf78fcd785574011c0e793c2cfc84881075b68ba547b537313564869c310b160bbe54e2983cdebbac221e2b842
-
SSDEEP
6144:kOO0pQqVWLiXJ+n/X2mwbTr4VjPQ0LFcn:5OwQwWmXJy2FTr4dy
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-