General
-
Target
b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.zip
-
Size
94KB
-
Sample
240521-gl6wysga39
-
MD5
e9f605e4b03b9baf30cee09b910000f4
-
SHA1
6547137feb16b183b1a68376d29f3cf56a969cb2
-
SHA256
d4d0e2487f93f090ff5340bfce327c31cada201f0e6646098ad3be66981d438a
-
SHA512
4d82b92a78f7570ea68f3849663da783e41e647358bc009767e0cb5335f94e8a4e4992ce83a0320f14c9436bb363019d8f4ce476a1872ffea6f2f7c1a148acf8
-
SSDEEP
1536:W4SXErmDj72TovSLAE/eWSgyI/OJ5HiGdVb0H2KeAjNdbXSoIFOAPGX4FrAF4CpS:vSUrmf72U6LbLS2o5JmzHFNq9J9C3CEk
Static task
static1
Behavioral task
behavioral1
Sample
b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f.exe
-
Size
178KB
-
MD5
a6c7dd82eace106350d20d93956360e6
-
SHA1
19c5ea0607b527e4c2b08a39583db38f503933e0
-
SHA256
b7ab94357342f73380569c9b23bc81741e1784b8a7cfdfe8df680000a1f3da1f
-
SHA512
6e3d950e1a16103710985e9e0993f26ece5f7d67eadbd711941e826117d0d884624ddf166d3a70e25453518bb2f7d9a9c2dede25f6785dcb24d6031ba29c419e
-
SSDEEP
1536:DAc76NGJEzLoCPMkXzxIGzA9aRmNjo/Phcnr6xMtxUtoIlESP5tA9bDQqpN+X:D7kXzxIGzA9aUo/PhcnVHUtoe5K9
Score10/10-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2