General
-
Target
b40c4e8d169abdd14c04db1958ad38c92340e78e436159723c530292d7cf601e
-
Size
145KB
-
Sample
240417-qthzjabc4x
-
MD5
960d4aee524d6007784636205e9aecc5
-
SHA1
1fd8bd82a5aeb56fcfff06b52f67bddcb5d04334
-
SHA256
b40c4e8d169abdd14c04db1958ad38c92340e78e436159723c530292d7cf601e
-
SHA512
5304076985d6e68ba03d4c37f2f7ab81d317e2250681ebd4333f55d8efd4610d41d9221f1a68edd6be801f776ec3a5ca47df5f4a9e49dcb2e901947fa61c2173
-
SSDEEP
3072:L+iYRICeQv6+1hysMSnDZkiv1JLOs+XFk:L+i0dy+S0Vhv11vak
Static task
static1
Behavioral task
behavioral1
Sample
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be.exe
-
Size
232KB
-
MD5
b5f3dc95c09fa3bfdf009a404736f94e
-
SHA1
03e471e7edf9bbcbe2483ebd1ba05364c93a190a
-
SHA256
f379c2c732470dbce8e17423baf7f6fcca63bcb13c4ade33a15df1225e3841be
-
SHA512
f63cba660384d5296e2f8aeeceba1a2d4707311a242cd5f12220008670cb5c2bf686b546fafe03cc6c5363bd62fe4c067a1f9dc73a8388488e13854b631ee546
-
SSDEEP
6144:j6zxC0r84BWnfZUH7SFcQU+9HFsvKMXOCU:kY0r9BeZUbSiy9HSvKwO
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2