General
-
Target
file
-
Size
263KB
-
Sample
230603-rek11sgh82
-
MD5
efbeb9e59d12e56e8025fb3f13484820
-
SHA1
84de3934d54cdee52c5e7f15a7043cf549565867
-
SHA256
f6d40c99bbde7b24d679bde627fb92bd5f695922f8dbdacc567d20fc3e990619
-
SHA512
9faa93b1c386326024a518d17e931fcb2478ea961239e8867b371c3cdf0aa4a93a134dda43c8e72a43a3e2fff4a153da0ef207a2eb681bff16850796f0d98f66
-
SSDEEP
3072:UhLEHt/Pc0Z4P4jVac+cao7MyqGXxFLrSHMmnw1R/H+AIN6oCXCwSi/D:kLG/Py6ccwmMShRr6Vnw1R/HUYoDA
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file
-
Size
263KB
-
MD5
efbeb9e59d12e56e8025fb3f13484820
-
SHA1
84de3934d54cdee52c5e7f15a7043cf549565867
-
SHA256
f6d40c99bbde7b24d679bde627fb92bd5f695922f8dbdacc567d20fc3e990619
-
SHA512
9faa93b1c386326024a518d17e931fcb2478ea961239e8867b371c3cdf0aa4a93a134dda43c8e72a43a3e2fff4a153da0ef207a2eb681bff16850796f0d98f66
-
SSDEEP
3072:UhLEHt/Pc0Z4P4jVac+cao7MyqGXxFLrSHMmnw1R/H+AIN6oCXCwSi/D:kLG/Py6ccwmMShRr6Vnw1R/HUYoDA
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-