General
-
Target
file
-
Size
219KB
-
Sample
231004-tlk1pseh69
-
MD5
8ac853e6f0a3ccae8cbe48a2bada4b13
-
SHA1
b258166c1a9338e6c9b379756db5d3b2857109c6
-
SHA256
0149b1b31183978292733c0ba295b1e1c0a5f6ca618b16b1dedaeb7a0e35aed5
-
SHA512
37e0c267f6406c103559d74217e822af0f47c864d46d6d8b4ce75a0736c669990b7750da24acda1136bf3576ef5f5c9df06b5e6a0b4f17b8f0b9979196fa3e30
-
SSDEEP
3072:/wXz7MfAIzFIZr0w5oaTCzYcgQc91bFeA7cWDmlfCX5CSt87hP9:scZz2Zr0wiqPcFuoWSlfRS
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file
-
Size
219KB
-
MD5
8ac853e6f0a3ccae8cbe48a2bada4b13
-
SHA1
b258166c1a9338e6c9b379756db5d3b2857109c6
-
SHA256
0149b1b31183978292733c0ba295b1e1c0a5f6ca618b16b1dedaeb7a0e35aed5
-
SHA512
37e0c267f6406c103559d74217e822af0f47c864d46d6d8b4ce75a0736c669990b7750da24acda1136bf3576ef5f5c9df06b5e6a0b4f17b8f0b9979196fa3e30
-
SSDEEP
3072:/wXz7MfAIzFIZr0w5oaTCzYcgQc91bFeA7cWDmlfCX5CSt87hP9:scZz2Zr0wiqPcFuoWSlfRS
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2