General
-
Target
1df5c1a5b3e7724fe0db734fc8ad007f7f346cb02765050c05820d127df94b86exe_JC.exe
-
Size
272KB
-
Sample
231012-193nzsfc25
-
MD5
7fa546aba2dbd4ed160339246ab8b6be
-
SHA1
d4fa5e14b9b0284e8837a77d62c91d6aba5c2eab
-
SHA256
1df5c1a5b3e7724fe0db734fc8ad007f7f346cb02765050c05820d127df94b86
-
SHA512
b649fd529ceb802898091a04a82c562a63364a6848b350ea7bf2da364606e127726ed9ca83dba92e77bd6812a1fe48a0224ae96d67da4a881f549995a95ecf32
-
SSDEEP
3072:jbabgQYvylv4QPQXx4CnO1cIILEG5Og+gvaDThIR7vcryIMzJ4Nw:PaMvylv4QPQXeCvII1ldvaRItJV
Static task
static1
Behavioral task
behavioral1
Sample
1df5c1a5b3e7724fe0db734fc8ad007f7f346cb02765050c05820d127df94b86exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1df5c1a5b3e7724fe0db734fc8ad007f7f346cb02765050c05820d127df94b86exe_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
1df5c1a5b3e7724fe0db734fc8ad007f7f346cb02765050c05820d127df94b86exe_JC.exe
-
Size
272KB
-
MD5
7fa546aba2dbd4ed160339246ab8b6be
-
SHA1
d4fa5e14b9b0284e8837a77d62c91d6aba5c2eab
-
SHA256
1df5c1a5b3e7724fe0db734fc8ad007f7f346cb02765050c05820d127df94b86
-
SHA512
b649fd529ceb802898091a04a82c562a63364a6848b350ea7bf2da364606e127726ed9ca83dba92e77bd6812a1fe48a0224ae96d67da4a881f549995a95ecf32
-
SSDEEP
3072:jbabgQYvylv4QPQXx4CnO1cIILEG5Og+gvaDThIR7vcryIMzJ4Nw:PaMvylv4QPQXeCvII1ldvaRItJV
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2