General
-
Target
NEAS.358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911exe_JC.exe
-
Size
179KB
-
Sample
231023-vbamnace58
-
MD5
2722b0312c2e8cb299647d97225c17e6
-
SHA1
0961bbbb6a87e68c97db29e57a878c0204029bcd
-
SHA256
358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911
-
SHA512
6f84a11c8d2441168f9ece41e5b7acf226a7e5b8cf2b6b7865a9055bf6e934a09c2fd90b662421f4d7f48bdcf9653e2dd8ce60afcbbd0a318273f9bf3af75dfb
-
SSDEEP
3072:Z1yBN6fur6AIscrbx+MkJa9ripeH7ewpNnrvIl6QuwNMPGROY0eQX:Zw7+AIprbwMFrbewnjC6Q0PqN
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911exe_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911exe_JC.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
NEAS.358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911exe_JC.exe
-
Size
179KB
-
MD5
2722b0312c2e8cb299647d97225c17e6
-
SHA1
0961bbbb6a87e68c97db29e57a878c0204029bcd
-
SHA256
358cd94b404d08274eb01e5466ef12cb8ddeb4ef8524d7cb501077503aac6911
-
SHA512
6f84a11c8d2441168f9ece41e5b7acf226a7e5b8cf2b6b7865a9055bf6e934a09c2fd90b662421f4d7f48bdcf9653e2dd8ce60afcbbd0a318273f9bf3af75dfb
-
SSDEEP
3072:Z1yBN6fur6AIscrbx+MkJa9ripeH7ewpNnrvIl6QuwNMPGROY0eQX:Zw7+AIprbwMFrbewnjC6Q0PqN
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2