General
-
Target
file.exe
-
Size
202KB
-
Sample
231005-f25hdsgg9w
-
MD5
0e912c89df4a4fce65d70506d0e7f233
-
SHA1
e437ddd952485dab4dde33373c8dfc1d2cc8370d
-
SHA256
45b199d7f3571172242647277be284df1a6fd3c4a01b084ec02bd9f661a8daf3
-
SHA512
9063e2f1b35887ffeeeea778ac5881895ce50baa41635082b451dcbf40e81826e68f773649f36437a032769c81f80cf255f1fe6f8dd915aed2937ffa62978191
-
SSDEEP
3072:/RqPDovM85s6O/z0U6Xz8nTNKYwPV4spZRvolZgw5HX/Vr:KDXIjkoU64R8dTRQlFPV
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
202KB
-
MD5
0e912c89df4a4fce65d70506d0e7f233
-
SHA1
e437ddd952485dab4dde33373c8dfc1d2cc8370d
-
SHA256
45b199d7f3571172242647277be284df1a6fd3c4a01b084ec02bd9f661a8daf3
-
SHA512
9063e2f1b35887ffeeeea778ac5881895ce50baa41635082b451dcbf40e81826e68f773649f36437a032769c81f80cf255f1fe6f8dd915aed2937ffa62978191
-
SSDEEP
3072:/RqPDovM85s6O/z0U6Xz8nTNKYwPV4spZRvolZgw5HX/Vr:KDXIjkoU64R8dTRQlFPV
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2