General
-
Target
file.exe
-
Size
192KB
-
Sample
221201-2fd9zagf54
-
MD5
1a7bc27f692d3dbece161a99346cadb5
-
SHA1
ee3480ed28ab3482e803132284714c0570000d2f
-
SHA256
16b79fe0d333c0872196f9d07799700e7057cf9cb35245a950c3160cf3361a04
-
SHA512
4d6983e26fcf16f2dd470bd32b2674a8ee88cf3c3c05d7567e208cfddd748c80c30665d3e54573b83cd35f978d80240de9f3c2632d33b24ab8be81816a555a21
-
SSDEEP
3072:m+bPrk/IX42aIJ5ieMJu9FFG4SlTx3edF6fX4FvRs9E3AZxpR/3d:mcX42aTehNG4S1x3Dvpld
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
192KB
-
MD5
1a7bc27f692d3dbece161a99346cadb5
-
SHA1
ee3480ed28ab3482e803132284714c0570000d2f
-
SHA256
16b79fe0d333c0872196f9d07799700e7057cf9cb35245a950c3160cf3361a04
-
SHA512
4d6983e26fcf16f2dd470bd32b2674a8ee88cf3c3c05d7567e208cfddd748c80c30665d3e54573b83cd35f978d80240de9f3c2632d33b24ab8be81816a555a21
-
SSDEEP
3072:m+bPrk/IX42aIJ5ieMJu9FFG4SlTx3edF6fX4FvRs9E3AZxpR/3d:mcX42aTehNG4S1x3Dvpld
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-