General
-
Target
file.exe
-
Size
328KB
-
Sample
230110-clpv8ach3s
-
MD5
4cdaa2afa42747ef38a6b647ab9eb05e
-
SHA1
232022c56f435336d8d71460d72de1d58f190039
-
SHA256
c99cbf6d177405e5aedb7e6bb29f5558b21678dcb8d092bf8bc57479de81ff7a
-
SHA512
d28387bdf95eb49590c2781293c0ab370716c87b2f3a0d0177cf6579ffecbfc9150ed2c4ada1a4c5624b0b97b5ad506e9893818f7167727f4847065bd8fd3499
-
SSDEEP
6144:D8vFYjOoUAsp3LC3O8Lg06p7dBA0X+icTJY:DKwC55kO8E04OicT
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
328KB
-
MD5
4cdaa2afa42747ef38a6b647ab9eb05e
-
SHA1
232022c56f435336d8d71460d72de1d58f190039
-
SHA256
c99cbf6d177405e5aedb7e6bb29f5558b21678dcb8d092bf8bc57479de81ff7a
-
SHA512
d28387bdf95eb49590c2781293c0ab370716c87b2f3a0d0177cf6579ffecbfc9150ed2c4ada1a4c5624b0b97b5ad506e9893818f7167727f4847065bd8fd3499
-
SSDEEP
6144:D8vFYjOoUAsp3LC3O8Lg06p7dBA0X+icTJY:DKwC55kO8E04OicT
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-