General
-
Target
d50cc359381325522385b32fb37aa695.bin
-
Size
138KB
-
Sample
231011-mccveagd3t
-
MD5
3bad44d2670e762a31d0b88f3e91c045
-
SHA1
7e7af3e86337fd74ff9ebc291205da85a021f21b
-
SHA256
5a2ea5ad3caedc397b32499780db43b6868997cde2c644fabdb464de7ea09e86
-
SHA512
980d472b29a96b1cc254b19a77b46493246ea6bdead69f2be6b4c214947ea4aa53c7603423c67e7a1c4c3a0f6eeb2064e81b91485a470e2960d44322159af669
-
SSDEEP
3072:qONSvzrSAfKzdwG23U60NW9yF8dpOGSRCS63kN0r+soYUn9xNRqe:qO4zu5FiUdW9yF8dpR93kN9sbWDqe
Static task
static1
Behavioral task
behavioral1
Sample
bd4e8361911dabb59f382e52e26614bbe08c0f60da5cfbaa412a8b9e2423587c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bd4e8361911dabb59f382e52e26614bbe08c0f60da5cfbaa412a8b9e2423587c.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
bd4e8361911dabb59f382e52e26614bbe08c0f60da5cfbaa412a8b9e2423587c.exe
-
Size
283KB
-
MD5
d50cc359381325522385b32fb37aa695
-
SHA1
f63ee5b87cea7e2385b7800c0f5728960546de70
-
SHA256
bd4e8361911dabb59f382e52e26614bbe08c0f60da5cfbaa412a8b9e2423587c
-
SHA512
2c106b342402668158e9e55495929ffb99ee00cf1063f3dcb538880aa967b70a123a5603dfb92d82d71842eb4b7e2cc4bc268e49c97473a8924c91b474cce220
-
SSDEEP
3072:1aHQFccmfkw9dCj/fkjFYmGX6jAAVfcezSepGt1U1wdwSDr9:YHQFDms8dCb8jSmSWVfcez5AdwK
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2