General
-
Target
file.exe
-
Size
302KB
-
Sample
221219-tn3crsfd76
-
MD5
32dbcdd1bdf62b27fd78893ec0fc885a
-
SHA1
999d1164d8f90cf4451b17b0faa9dc7e1e70e36a
-
SHA256
c89cd0e72d30cd64c972295f43322f551340c4bdad9aef49554dc1f0c103517f
-
SHA512
8babf4a8b75d3ee3138b08c247444086850690ace02fbfcb7f3aed2e5936e64bd152a85474950dde9a23865cbc9c7a35c24dfe7f28671656dd251a93df78ae10
-
SSDEEP
6144:CLeUZhB0RgCdHJpizQCq/pGRz+3ng+E49HwchLP3i:CCUBQnAKBAwnVZH9P3
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
302KB
-
MD5
32dbcdd1bdf62b27fd78893ec0fc885a
-
SHA1
999d1164d8f90cf4451b17b0faa9dc7e1e70e36a
-
SHA256
c89cd0e72d30cd64c972295f43322f551340c4bdad9aef49554dc1f0c103517f
-
SHA512
8babf4a8b75d3ee3138b08c247444086850690ace02fbfcb7f3aed2e5936e64bd152a85474950dde9a23865cbc9c7a35c24dfe7f28671656dd251a93df78ae10
-
SSDEEP
6144:CLeUZhB0RgCdHJpizQCq/pGRz+3ng+E49HwchLP3i:CCUBQnAKBAwnVZH9P3
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-