General
-
Target
244cfeb94a072b321d19019e769daee63ed9ec5eb0ca1ddb069c350ce6bef8e1
-
Size
163KB
-
Sample
240417-qt23eabc7x
-
MD5
47be6d835a9fb5a0b4b2386b0c53b333
-
SHA1
9a77ecb9d155ad11e063a913d58096aababf9d21
-
SHA256
244cfeb94a072b321d19019e769daee63ed9ec5eb0ca1ddb069c350ce6bef8e1
-
SHA512
15df3277f1d3e2afa3e198e193536ab14aa0122ac42b1dfe792dd4ec91453833bea40bbf527e612ade68c17b3acf4ee200959cc01164260455b37bdc901a00b6
-
SSDEEP
3072:5PEeQf0utVsXchQxZ3TekmXM3FQmqJtEnkmCUic+bgqCkxWmkk3AuDma:Z7VunuIQrqkmXM1tbnkxNbgrkxFk3Yb
Static task
static1
Behavioral task
behavioral1
Sample
d171d38b6205dd0a4b69004e182eb2d5bfaa7f97fff4aa622c491f383833de03.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d171d38b6205dd0a4b69004e182eb2d5bfaa7f97fff4aa622c491f383833de03.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
d171d38b6205dd0a4b69004e182eb2d5bfaa7f97fff4aa622c491f383833de03.exe
-
Size
298KB
-
MD5
462df7d53f23fe42745899349ed6d566
-
SHA1
5d5aeb88f05f8bb21453aae94f46e0fe1723e3d4
-
SHA256
d171d38b6205dd0a4b69004e182eb2d5bfaa7f97fff4aa622c491f383833de03
-
SHA512
6fc07a384d5bb94120142153eb693fb9b7195af2b68189bb7e8c5f204a69ec1ea4c1a1b25e69ee6bb348b61d2884a7e93c2f2373ef60075d8806902802bd088c
-
SSDEEP
3072:S2WKB6KtS92/5HnwTFEaaCszMl5BQo5dQvVziXdHGHBW3hqHJlb6D:IKNS9mHeFEaa1I3BdcqdHGHBc4Jp6
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2