General
-
Target
SecuriteInfo.com.Win32.BotX-gen.31335.5127
-
Size
203KB
-
Sample
240114-spe37acfb9
-
MD5
e80ed6ccb333b7fc33ffc98bca43b57d
-
SHA1
170281a608fe94eee06a9f45466f6a47bd2272e3
-
SHA256
3555ecd8bb270312994e03bf64695a3f1c0213a2abf85b890ebe2bb40a9648a3
-
SHA512
3209c004cebb1e2f544f7d8457175a62da8a225bc08bcbb051c240eddc610ca8e1ddfe7f6d758d2e09517030afad689b6805fc2b8b801a1f182c04369191a30d
-
SSDEEP
3072:eafjdfYraZJXENc8uCXJiXK1K2LEpzUCV+PaIh9bwdANblLNBNKRrxbU+cmH:eafjqQ15OCyLLkCVkxbDco
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.BotX-gen.31335.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.BotX-gen.31335.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
SecuriteInfo.com.Win32.BotX-gen.31335.5127
-
Size
203KB
-
MD5
e80ed6ccb333b7fc33ffc98bca43b57d
-
SHA1
170281a608fe94eee06a9f45466f6a47bd2272e3
-
SHA256
3555ecd8bb270312994e03bf64695a3f1c0213a2abf85b890ebe2bb40a9648a3
-
SHA512
3209c004cebb1e2f544f7d8457175a62da8a225bc08bcbb051c240eddc610ca8e1ddfe7f6d758d2e09517030afad689b6805fc2b8b801a1f182c04369191a30d
-
SSDEEP
3072:eafjdfYraZJXENc8uCXJiXK1K2LEpzUCV+PaIh9bwdANblLNBNKRrxbU+cmH:eafjqQ15OCyLLkCVkxbDco
-
XMRig Miner payload
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2