General
-
Target
file
-
Size
191KB
-
Sample
231005-x8dfxsgg92
-
MD5
170aa66f5331dc87707f0d7a405a45f0
-
SHA1
5390a4d9e516c05bad7c86b3415c5fd53e0fb9c1
-
SHA256
539e5470f3745740167fc0db04324c128470e822bddd7dfb7814dd27c60b1a03
-
SHA512
d9d36a77d974a016bf7742734f5fae1ca85e0c9ed38ab48eb4f1743a27530f75309d38ebf9c83b0a2f6ff41113119f816baf4f0fe2d8ae156cad950ed2a65ef6
-
SSDEEP
3072:mN/si5hMdfxA468QwBxt3YNL6tROXsEvoOEQ045Z2UvSNH5ju:GsPfxJ6mBx+SRUvvoOEQ04xvSf
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file
-
Size
191KB
-
MD5
170aa66f5331dc87707f0d7a405a45f0
-
SHA1
5390a4d9e516c05bad7c86b3415c5fd53e0fb9c1
-
SHA256
539e5470f3745740167fc0db04324c128470e822bddd7dfb7814dd27c60b1a03
-
SHA512
d9d36a77d974a016bf7742734f5fae1ca85e0c9ed38ab48eb4f1743a27530f75309d38ebf9c83b0a2f6ff41113119f816baf4f0fe2d8ae156cad950ed2a65ef6
-
SSDEEP
3072:mN/si5hMdfxA468QwBxt3YNL6tROXsEvoOEQ045Z2UvSNH5ju:GsPfxJ6mBx+SRUvvoOEQ04xvSf
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2