General
-
Target
file.exe
-
Size
173KB
-
Sample
230316-pv75dada9y
-
MD5
15ff2e133cf2a118b4dfcfebe26cc2d1
-
SHA1
c303ada89afdaeba1ee50c98bd1b547f28c45ef0
-
SHA256
0557d5383704424bd7ca3b63b948e3bf47f869f5bf782142deab956c27f447f5
-
SHA512
90156fc077432af7d0b11782289c67e4421aa6e68638bb513a6a636a8de8d2588ca5ab17528ecd02c1cb8248521cfead2693b9add3bedbf47d7c0c041c1cbc87
-
SSDEEP
3072:oDf+n4MRz4MFb3FvhbR9JWQUrF3PFIn9jrsbYcXJX:sg9fbVvhfcgjIn
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
tofsee
muspelheim.be
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
173KB
-
MD5
15ff2e133cf2a118b4dfcfebe26cc2d1
-
SHA1
c303ada89afdaeba1ee50c98bd1b547f28c45ef0
-
SHA256
0557d5383704424bd7ca3b63b948e3bf47f869f5bf782142deab956c27f447f5
-
SHA512
90156fc077432af7d0b11782289c67e4421aa6e68638bb513a6a636a8de8d2588ca5ab17528ecd02c1cb8248521cfead2693b9add3bedbf47d7c0c041c1cbc87
-
SSDEEP
3072:oDf+n4MRz4MFb3FvhbR9JWQUrF3PFIn9jrsbYcXJX:sg9fbVvhfcgjIn
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-