General
-
Target
f65a1f4030a921f739e448b38f6dd3475dab4bf3b5dc8d52f22bcd9e382b1c19
-
Size
128KB
-
Sample
240417-r7nmlsec7t
-
MD5
6d3e7c759bc0bf6bf3b27fadc454b68c
-
SHA1
ea110c1a47ffa9959e96a0dc4d606735cc2d8e4f
-
SHA256
f65a1f4030a921f739e448b38f6dd3475dab4bf3b5dc8d52f22bcd9e382b1c19
-
SHA512
f658b517b503d2cceafa6d22c5a8e3611d572df1eda38b1a4816fd23bb0b63963dd87b50bf34e39a85b7a08fed304427062ed689a7326412e3fd167ef9060a79
-
SSDEEP
3072:y+Y9AXzi2T88W8u+t1QIIKBgS5Hm226jpdR1lAM09J4JplGGz:yP9V2AZ+tDd2eT1509J4xz
Static task
static1
Behavioral task
behavioral1
Sample
8240e21305559cabc41ccf60e6683e8fb3f6ae80a20e289e687366ccc4594c40.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8240e21305559cabc41ccf60e6683e8fb3f6ae80a20e289e687366ccc4594c40.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
8240e21305559cabc41ccf60e6683e8fb3f6ae80a20e289e687366ccc4594c40.exe
-
Size
203KB
-
MD5
6b7204c0cb219b7d01999025ccd85fdc
-
SHA1
1f57fbfdcf6d71d0d5a36602e1e83bc9dee3ac7a
-
SHA256
8240e21305559cabc41ccf60e6683e8fb3f6ae80a20e289e687366ccc4594c40
-
SHA512
68a19f84eb4d73394a2bb2b7629f9582e91b54713b19e71722ba5359636ce36d9aa9951af7b729d65752a7aff916ee91abd87f34c2e4aad43cebef777800742b
-
SSDEEP
3072:eSf/dfuraZJXENc8uCXJiXK1K2LS1G2B+vioyUSdUuD5BBNcRrxOJ+cmH:eSf/MQ15t1TB+PSHexLco
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1