General
-
Target
6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900
-
Size
11.8MB
-
Sample
240620-kdt4zascnr
-
MD5
1115bd97b549ced1b9c74e08e534d655
-
SHA1
274950f5a96e621e789ab887dd2218ee792937b2
-
SHA256
6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900
-
SHA512
e12cf306376ccbc23498c7a9b1b5f5eb8a5976ad182484758187151322397e5211c25fa5829c02f6183534113630f8a11ff3e29cf51a02a2485f0750a7a48b29
-
SSDEEP
12288:jsWR4IPuw0m+MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMn:4643w0
Static task
static1
Behavioral task
behavioral1
Sample
6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900
-
Size
11.8MB
-
MD5
1115bd97b549ced1b9c74e08e534d655
-
SHA1
274950f5a96e621e789ab887dd2218ee792937b2
-
SHA256
6175a58c579f7af51d21cc02cdc2a85e6f9a9622b1134dc2b105118a82c19900
-
SHA512
e12cf306376ccbc23498c7a9b1b5f5eb8a5976ad182484758187151322397e5211c25fa5829c02f6183534113630f8a11ff3e29cf51a02a2485f0750a7a48b29
-
SSDEEP
12288:jsWR4IPuw0m+MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMn:4643w0
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1