General
-
Target
file.exe
-
Size
250KB
-
Sample
230703-h9h1gafd64
-
MD5
db1e413167c8f07f9039aced287777f7
-
SHA1
6ed7c7fb7a8f81c6dc1ed56f433b98502ad698af
-
SHA256
5c94999358c03c5088370f41bf54d8ecadce66c75b96d88c7e665b7d7566d5b6
-
SHA512
820200875a2031c649e16529cc4fea175cf53871fe98693df5a537f37bb0ce0d1c591d4f2f43f9a5e2e413fc3436aea017f17776e87b3aa181363bd8efa88299
-
SSDEEP
3072:05AcY+kvNkSFPWe4jCCxBoIXA+lDD1SKJwxQaZbuB/KjpP:3ASFPWe5A/XXln1/JIZ4Sjp
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
250KB
-
MD5
db1e413167c8f07f9039aced287777f7
-
SHA1
6ed7c7fb7a8f81c6dc1ed56f433b98502ad698af
-
SHA256
5c94999358c03c5088370f41bf54d8ecadce66c75b96d88c7e665b7d7566d5b6
-
SHA512
820200875a2031c649e16529cc4fea175cf53871fe98693df5a537f37bb0ce0d1c591d4f2f43f9a5e2e413fc3436aea017f17776e87b3aa181363bd8efa88299
-
SSDEEP
3072:05AcY+kvNkSFPWe4jCCxBoIXA+lDD1SKJwxQaZbuB/KjpP:3ASFPWe5A/XXln1/JIZ4Sjp
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-