General
-
Target
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
-
Size
10.5MB
-
Sample
240510-f1dnaadc2z
-
MD5
400992e89f640ced83313c8d0cec106e
-
SHA1
abcc1616d181034b37b6e2aee2b274a4b241ed7f
-
SHA256
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
-
SHA512
8ef86fc13c10e0867111159265d0f6e3a011e35aa07b51aa94b6a52bf80272fff5a0339e3dea13e9c87a0c3f319d87014326256372dfb27bd2c74d58d7e42e15
-
SSDEEP
12288:xucqxGrf50Fqwswswswswswswswswswswswswswswswswswswswswswswswswswv:xuM6F
Static task
static1
Behavioral task
behavioral1
Sample
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
-
Size
10.5MB
-
MD5
400992e89f640ced83313c8d0cec106e
-
SHA1
abcc1616d181034b37b6e2aee2b274a4b241ed7f
-
SHA256
f00b17829026124838d62c5d1f920a720476547d5e8309c5027614d29a416e05
-
SHA512
8ef86fc13c10e0867111159265d0f6e3a011e35aa07b51aa94b6a52bf80272fff5a0339e3dea13e9c87a0c3f319d87014326256372dfb27bd2c74d58d7e42e15
-
SSDEEP
12288:xucqxGrf50Fqwswswswswswswswswswswswswswswswswswswswswswswswswswv:xuM6F
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2