General
-
Target
file
-
Size
274KB
-
Sample
231007-em5deahb3w
-
MD5
bfa4eb9f0f56dd7039448a2a6ed62e0e
-
SHA1
dbbf1517dd7a0540517d1ecf7f187e5cb9687900
-
SHA256
3442b626e35087c5314d21d9f29210341c5546379f7182d8ec8676098394a676
-
SHA512
151c785e09a3f36133f7c5b88c93bd55bf9f5d1173aef636f8ef80de50a6e3d0f3f0f57c83643ce592b1c430ef4f13bd343f66874d061323d0c2838e999d29cf
-
SSDEEP
3072:j4JN9ZGKd4jfW2Gn9P7MUQl4TiN1ICYrI06lhK3uKoK8:8RZdd4jf29P4MONJYrV6nK3u5K
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file
-
Size
274KB
-
MD5
bfa4eb9f0f56dd7039448a2a6ed62e0e
-
SHA1
dbbf1517dd7a0540517d1ecf7f187e5cb9687900
-
SHA256
3442b626e35087c5314d21d9f29210341c5546379f7182d8ec8676098394a676
-
SHA512
151c785e09a3f36133f7c5b88c93bd55bf9f5d1173aef636f8ef80de50a6e3d0f3f0f57c83643ce592b1c430ef4f13bd343f66874d061323d0c2838e999d29cf
-
SSDEEP
3072:j4JN9ZGKd4jfW2Gn9P7MUQl4TiN1ICYrI06lhK3uKoK8:8RZdd4jf29P4MONJYrV6nK3u5K
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2