General
-
Target
20dfdbd674efcbab44b32d6cc584ad68.bin
-
Size
129KB
-
Sample
231009-bg95xshb4y
-
MD5
530feee697c7588a9b725b88a8e6f306
-
SHA1
8285c4161e93e60f8d57e4e5391aa36fac8634b5
-
SHA256
9064e071e72a8272e83c562c119698b6dc7a9a5cfa1eb708eb36930c58181755
-
SHA512
8c046a96373c3fa218fcf4424d6d6331779af67ba8c826964e0164d546cd6a4296b54461adf8a14ee55511b276ad6ce366be9de62929007419cc2001fce889ca
-
SSDEEP
3072:yYe4GRuIVZgyNn66kHaUDZY8ZwdSZZkCudetgjHBx5TE:yG4dYy9+aLk/pux+
Static task
static1
Behavioral task
behavioral1
Sample
ccf9493dddbd490acdf1a7847a914d2f337f89c68c65c267e93b259efd8b2b5c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ccf9493dddbd490acdf1a7847a914d2f337f89c68c65c267e93b259efd8b2b5c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
ccf9493dddbd490acdf1a7847a914d2f337f89c68c65c267e93b259efd8b2b5c.exe
-
Size
287KB
-
MD5
20dfdbd674efcbab44b32d6cc584ad68
-
SHA1
b80282075938b6914c5961fa26cc93e7bdb47b75
-
SHA256
ccf9493dddbd490acdf1a7847a914d2f337f89c68c65c267e93b259efd8b2b5c
-
SHA512
7247b396ea3ef70bb57a4803d0aebd67fd673dfb8cbba0cbb4192370734b6a7e4579b98a2f4609d43c4f653e001e31008bb74e03d67f4e4e014dccc2c5a796bd
-
SSDEEP
3072:TZ77mQLNtWbyeOtxcaiiDzSZq6oarZSb2rdbvLJAwdNo9yv7r3O4a:t7K0W+eOtSjA8SbsDLdWQzTO
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2