General
-
Target
cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e
-
Size
10.0MB
-
Sample
240506-lba4rafe9t
-
MD5
19f2564fe3b3636567957a0b29a78ac5
-
SHA1
f4d8c30d67b9dad6bca7a703bb42578135fc966b
-
SHA256
cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e
-
SHA512
962c4c8bd1966f6e742e60625e326f112fd0eed2d045bab0c3dee92505982e11ef7cc71da2af22251ec580cfc77e50640e47dd7e81082f04973e53aa2d914b83
-
SSDEEP
6144:rzH/2P/6m1uCQ/RqO+Wy+PqSb0iXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:rT/2P/6m1uCQMO+W1Cx
Static task
static1
Behavioral task
behavioral1
Sample
cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e
-
Size
10.0MB
-
MD5
19f2564fe3b3636567957a0b29a78ac5
-
SHA1
f4d8c30d67b9dad6bca7a703bb42578135fc966b
-
SHA256
cc4961f20bc142b7f874d38b3b4179a03b428c8348eaa177c57579673ea0624e
-
SHA512
962c4c8bd1966f6e742e60625e326f112fd0eed2d045bab0c3dee92505982e11ef7cc71da2af22251ec580cfc77e50640e47dd7e81082f04973e53aa2d914b83
-
SSDEEP
6144:rzH/2P/6m1uCQ/RqO+Wy+PqSb0iXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:rT/2P/6m1uCQMO+W1Cx
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2