General
-
Target
abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44
-
Size
152KB
-
Sample
231106-l4z9caca45
-
MD5
fa093abb8610d3dca89596ccba4ef31e
-
SHA1
5dc9acec8aeeeb568957e8b48eb2b75cc77848e2
-
SHA256
4994865f0a463637fdba17e004e2fe306f044d2155b827199523b37112e1e8bb
-
SHA512
b784faa99b01b85aaf3588587156162a21f9ba586e41b73715ac627fd59879f870c54fa3b706b9bff507cb4b26e1edad2ca7e4f6e19796b0c32f4657e7b61db7
-
SSDEEP
3072:aLqWudUVk9bOxTQm8Jo1+1kRPAvz64IeF+LQket1rCtJbysH3o:KIdUVobOx6l1kAB9FcP616bysH3o
Static task
static1
Behavioral task
behavioral1
Sample
abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44
-
Size
256KB
-
MD5
fef3091059af5ae452cd4554a7fb2f31
-
SHA1
6716795202f0eb637e61b5c2e12561e4587b322d
-
SHA256
abb89870a6ffac63572b4f2026957ee5c75eaeb17db0eec61629333da244ba44
-
SHA512
f895a12bf19419bdc0392b215d135acf2acd0479ca632b807529a68c52cfb60603bb9a462c380d2c15031819e87db6ce13cc987ac385891dabc31760401e6a6b
-
SSDEEP
3072:yr992I1yxYhjZjXLR1EalWmPEDUvz64IeF+GA52A26Q3GLeJig/oGOUZ:TI1yK1LRuaQmP2+B9FXRGKJ1o
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2