General
-
Target
38972935c945a1678727dec76e0f3a9d7914647f30f84d01683f6d3a22c2b43f_JC.exe
-
Size
206KB
-
Sample
230919-s95vcacb36
-
MD5
991269e0fee66cecedbefc1c229c5476
-
SHA1
9d4d824280faed254c0c0c497c918a21336ff69e
-
SHA256
38972935c945a1678727dec76e0f3a9d7914647f30f84d01683f6d3a22c2b43f
-
SHA512
13a8bb82fb4cae4f2ac8687d7b3ac171c0e7203e590a5d6db4c882d79cf12b7b5ba3af1eec1bf27e2ad19b64ede293840041f0d95d807b46e4c36bb9844bd07c
-
SSDEEP
3072:zG2kPKjL6KNCjZNzDpjAQSOLvEpNSL7EeAHxefDPRvTqkz5WMYTgK:JkSjLVNCj/zD9AEwz20efjBGMYTd
Static task
static1
Behavioral task
behavioral1
Sample
38972935c945a1678727dec76e0f3a9d7914647f30f84d01683f6d3a22c2b43f_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
38972935c945a1678727dec76e0f3a9d7914647f30f84d01683f6d3a22c2b43f_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
38972935c945a1678727dec76e0f3a9d7914647f30f84d01683f6d3a22c2b43f_JC.exe
-
Size
206KB
-
MD5
991269e0fee66cecedbefc1c229c5476
-
SHA1
9d4d824280faed254c0c0c497c918a21336ff69e
-
SHA256
38972935c945a1678727dec76e0f3a9d7914647f30f84d01683f6d3a22c2b43f
-
SHA512
13a8bb82fb4cae4f2ac8687d7b3ac171c0e7203e590a5d6db4c882d79cf12b7b5ba3af1eec1bf27e2ad19b64ede293840041f0d95d807b46e4c36bb9844bd07c
-
SSDEEP
3072:zG2kPKjL6KNCjZNzDpjAQSOLvEpNSL7EeAHxefDPRvTqkz5WMYTgK:JkSjLVNCj/zD9AEwz20efjBGMYTd
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2