General
-
Target
5b69fdf9a7a262ec979a01058970f3f8e8dfe4dbac0266554104da90716630db
-
Size
3.8MB
-
Sample
240905-bj74ca1dkg
-
MD5
d7d4c59739da6a18ae7309621fa394d3
-
SHA1
97caf87209e5dd84c74033542a20d24007b23ec8
-
SHA256
5b69fdf9a7a262ec979a01058970f3f8e8dfe4dbac0266554104da90716630db
-
SHA512
d162b00cfa9dbffcf1b5deb27de7820478a9d2681e543b4cf73ee25a4b2784b82ee2d79b22b099a58f00bad40c8520d0e00e6418bd04749b6669cb53d7e3f630
-
SSDEEP
98304:G279KJBY/TCCDW/xt6KfXgl2DqvZjgU5iMlLp8SUvOU:GDXwmpn6cXglGcjLVL5M
Static task
static1
Behavioral task
behavioral1
Sample
21a5e8cf356706a639eee50ea97cecef91685eb906921245c314ac50950b9825.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21a5e8cf356706a639eee50ea97cecef91685eb906921245c314ac50950b9825.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
21a5e8cf356706a639eee50ea97cecef91685eb906921245c314ac50950b9825.exe
-
Size
10.5MB
-
MD5
274d0ab4368246be7f22990d9d5cb4cf
-
SHA1
d34547e852863893aef034effc726bf2ee227d02
-
SHA256
21a5e8cf356706a639eee50ea97cecef91685eb906921245c314ac50950b9825
-
SHA512
dab676f30f08c6719e26cc376c89803a14d89adf50c6ee31d941f724b3dae03ca1cce950a3dd7651e3ed5f40323b021c875cdd1dfbbba9952cd417d7a3f90e81
-
SSDEEP
6144:Sc6OZDisWsD0Td2HJxO+m8PuG1R4WnWjrsaz:S1OZDisvwdaxO0PuG1R4CWs
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2