General
-
Target
file.exe
-
Size
255KB
-
Sample
231012-jwlpwahh54
-
MD5
33030d0b493f19bb8523b5fc1342bb27
-
SHA1
725238253dbcdba1d290deee6f811ff34724065a
-
SHA256
6f03902dc9064576d27afb97ff51eeee325dbfe1d5e0a62f84b70fa0d2645f94
-
SHA512
e66812f18320557d838fa3446329d5fc7362e6ad3ac595e4b8c6b5ce3b14e04b45dd790b90b0529f6a58c8fd993955586145545ab3de7d25f046b2356999799a
-
SSDEEP
3072:4ZtRyRPxlad/IzBVrDadItw0xYbN79/2qEsIClpHN:ktRyC/Iz+Ew0abNBuqEtE
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file.exe
-
Size
255KB
-
MD5
33030d0b493f19bb8523b5fc1342bb27
-
SHA1
725238253dbcdba1d290deee6f811ff34724065a
-
SHA256
6f03902dc9064576d27afb97ff51eeee325dbfe1d5e0a62f84b70fa0d2645f94
-
SHA512
e66812f18320557d838fa3446329d5fc7362e6ad3ac595e4b8c6b5ce3b14e04b45dd790b90b0529f6a58c8fd993955586145545ab3de7d25f046b2356999799a
-
SSDEEP
3072:4ZtRyRPxlad/IzBVrDadItw0xYbN79/2qEsIClpHN:ktRyC/Iz+Ew0abNBuqEtE
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2