General
-
Target
file
-
Size
253KB
-
Sample
231023-tzkxvscb59
-
MD5
127450d6d27fe7279152ee41f2000e84
-
SHA1
364c48ec0e18867e64dd1b2e55c11f40952fe8fa
-
SHA256
4086a65a6f05acad63c7c0bfe30805912a17e560ac8817af73717ef9fdc8ce71
-
SHA512
49f3826a2fd3b040dccb0cae9ae9f962aa7b913a541b4239a1133acd803bff90ff680a3c8e9a486858314991c0b1b60338490e37cf4ad21978ebce73240611b9
-
SSDEEP
3072:hwXAGaRVLR6OGOyfDYYX2oREGsmA0gi7R5d8p1GpufrAV:e1aRVL8bOCDYY+Gs7i961U
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
file
-
Size
253KB
-
MD5
127450d6d27fe7279152ee41f2000e84
-
SHA1
364c48ec0e18867e64dd1b2e55c11f40952fe8fa
-
SHA256
4086a65a6f05acad63c7c0bfe30805912a17e560ac8817af73717ef9fdc8ce71
-
SHA512
49f3826a2fd3b040dccb0cae9ae9f962aa7b913a541b4239a1133acd803bff90ff680a3c8e9a486858314991c0b1b60338490e37cf4ad21978ebce73240611b9
-
SSDEEP
3072:hwXAGaRVLR6OGOyfDYYX2oREGsmA0gi7R5d8p1GpufrAV:e1aRVL8bOCDYY+Gs7i961U
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2