General
-
Target
file
-
Size
199KB
-
Sample
231001-s86p9abh3v
-
MD5
8c8b3b3e93edc084a60787d1670f6571
-
SHA1
8d49792c08d05da4aad0943c953d4766e2c45d80
-
SHA256
66bcc8dbc2c587eb355a5c51b2b344151ad657cf48c4bf22b23e20b4b5ff63a8
-
SHA512
172af6fde03ec4ba45d8cd8ce20e4c675493546db78a91cc75c297d0610ad6a46b9ff9d6e8b5322eb8a709adbea02c57622684264e98c3aff50c5c2993dd255f
-
SSDEEP
3072:pP+qB/Z2bdlViAD6DR4iq0S2AvHmZnTJmQ7rgAwrq0E0iXqJb5/HNl:p/8J+AD6m/9fmZnlmQ4AUEXa/Hf
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file
-
Size
199KB
-
MD5
8c8b3b3e93edc084a60787d1670f6571
-
SHA1
8d49792c08d05da4aad0943c953d4766e2c45d80
-
SHA256
66bcc8dbc2c587eb355a5c51b2b344151ad657cf48c4bf22b23e20b4b5ff63a8
-
SHA512
172af6fde03ec4ba45d8cd8ce20e4c675493546db78a91cc75c297d0610ad6a46b9ff9d6e8b5322eb8a709adbea02c57622684264e98c3aff50c5c2993dd255f
-
SSDEEP
3072:pP+qB/Z2bdlViAD6DR4iq0S2AvHmZnTJmQ7rgAwrq0E0iXqJb5/HNl:p/8J+AD6m/9fmZnlmQ4AUEXa/Hf
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2