General
-
Target
file.exe
-
Size
260KB
-
Sample
230109-emcy6age3z
-
MD5
668eab4e7861433c3f9be42c3d243735
-
SHA1
187ace33301253399570e27b932ae969737feced
-
SHA256
072ccb1fdefeec0c942ec66943a650f9ac9fab1d491a255cd8db9f0ab4dc20f4
-
SHA512
fbc2f651464346d8945cf9d34dec51ca0a4e61332c627b6fa66ac9a458c9ba38801b0f9e3cc585808d6663438fdab8a4729113e2148230e67a95f240ec8c4031
-
SSDEEP
3072:kOXEYTwAL9pev5tZnt915pZxTv+0uR5+KEqARuh9hZCRRzMuWZgd3n:FrLCv5tZntvTTuR5+KEU1cqgd3
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
260KB
-
MD5
668eab4e7861433c3f9be42c3d243735
-
SHA1
187ace33301253399570e27b932ae969737feced
-
SHA256
072ccb1fdefeec0c942ec66943a650f9ac9fab1d491a255cd8db9f0ab4dc20f4
-
SHA512
fbc2f651464346d8945cf9d34dec51ca0a4e61332c627b6fa66ac9a458c9ba38801b0f9e3cc585808d6663438fdab8a4729113e2148230e67a95f240ec8c4031
-
SSDEEP
3072:kOXEYTwAL9pev5tZnt915pZxTv+0uR5+KEqARuh9hZCRRzMuWZgd3n:FrLCv5tZntvTTuR5+KEU1cqgd3
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-