General
-
Target
dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606
-
Size
323KB
-
Sample
230107-zvdkwaeg36
-
MD5
35b01d3ca6074a927b19d4d1211116e3
-
SHA1
096dc91d4f9ca7819e3ae284b10c8583c91e7feb
-
SHA256
dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606
-
SHA512
a4555b5def008e866f580eb301e57ea12f056a68b7646f7cbc8e5990f280a818db1dbb45e1eaa7b09d43d35e7b76d2b4d55d13606117363c6453ea9a0b47d321
-
SSDEEP
6144:F2qGJT+LeGNaq0C+RTCMSYIfjtOMWdqMS/sX2Bi6Wbt:F2qGJKCGNaq0CJMlIfxgUEX2Bi
Static task
static1
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606
-
Size
323KB
-
MD5
35b01d3ca6074a927b19d4d1211116e3
-
SHA1
096dc91d4f9ca7819e3ae284b10c8583c91e7feb
-
SHA256
dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606
-
SHA512
a4555b5def008e866f580eb301e57ea12f056a68b7646f7cbc8e5990f280a818db1dbb45e1eaa7b09d43d35e7b76d2b4d55d13606117363c6453ea9a0b47d321
-
SSDEEP
6144:F2qGJT+LeGNaq0C+RTCMSYIfjtOMWdqMS/sX2Bi6Wbt:F2qGJKCGNaq0CJMlIfxgUEX2Bi
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-