General
-
Target
9c9b7260556caeabcb0503f3b105b059b1d7ad78c7efc12d15ba506e7e2c2052_JC.exe
-
Size
254KB
-
Sample
230917-sc47jsdd45
-
MD5
8711b0f84531c6aa872bd7b9cbafe866
-
SHA1
71e860db1fcd61be5c5034c1a6e7f60db822c32b
-
SHA256
9c9b7260556caeabcb0503f3b105b059b1d7ad78c7efc12d15ba506e7e2c2052
-
SHA512
236df6134cb8ef922beced452948bf736bd8a3481ab084b76072570357b971c779ef809497293775cb75f98550af52510e87108b161c695df35bac917487e6c3
-
SSDEEP
3072:geTmM10cMLLQ6vbxXhBjOlUK1Pm2jWyhG4OK8ZzIMxfezD80:MMecMQ6vphBq1NrjWyhrAz/xW
Static task
static1
Behavioral task
behavioral1
Sample
9c9b7260556caeabcb0503f3b105b059b1d7ad78c7efc12d15ba506e7e2c2052_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9c9b7260556caeabcb0503f3b105b059b1d7ad78c7efc12d15ba506e7e2c2052_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
9c9b7260556caeabcb0503f3b105b059b1d7ad78c7efc12d15ba506e7e2c2052_JC.exe
-
Size
254KB
-
MD5
8711b0f84531c6aa872bd7b9cbafe866
-
SHA1
71e860db1fcd61be5c5034c1a6e7f60db822c32b
-
SHA256
9c9b7260556caeabcb0503f3b105b059b1d7ad78c7efc12d15ba506e7e2c2052
-
SHA512
236df6134cb8ef922beced452948bf736bd8a3481ab084b76072570357b971c779ef809497293775cb75f98550af52510e87108b161c695df35bac917487e6c3
-
SSDEEP
3072:geTmM10cMLLQ6vbxXhBjOlUK1Pm2jWyhG4OK8ZzIMxfezD80:MMecMQ6vphBq1NrjWyhrAz/xW
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2