General
-
Target
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62
-
Size
106KB
-
Sample
221130-chsspsgh77
-
MD5
1b8ed438dc07c77fb9d09f58da368d6a
-
SHA1
76443ddff508f62a5c7a65372c7d9d481c92e967
-
SHA256
f8541396ed9a55c9c323f12515d01a7d2653aabacf73046415757b45b07d7e50
-
SHA512
e3ef2890e4f5b71dad665866d0a771cbe2f65269ac29cad2b9fcf8f9b1b2af0f0491e085af979227b31a952906c50249a0d18421a65250f9dc869536ef6f0088
-
SSDEEP
1536:eqxtFFrdq/O8ZY35tVNQ02ceX8bh7d6Mt240SGUvOn/+7aC5EuLbjr57IbqooJRf:FroNytVEc28tZ6EuSGcOn//Q3r5H5iC
Static task
static1
Behavioral task
behavioral1
Sample
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62
-
Size
148KB
-
MD5
53538af5c50d7630c126e6c2dff32c7b
-
SHA1
19d9fc9ad096addf16608b6f13ea24bd042c6c51
-
SHA256
38684693053584c3cab7a9de72d95a8a1bd010351ce1c023505f36b770f7fa62
-
SHA512
4d234a9e726d6fb5822e5a31c00d63f0ac6aa0bad4c129c270d18fe7168a6760a030dc3c48305a88350756c4836b373a081070622cc32806af6b71c221c7db68
-
SSDEEP
3072:i2cTyeE8AeWn5ku22jifgRimvWkdpvbY:CTyx8Aej2jdzek/Y
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-