General
-
Target
ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5
-
Size
400KB
-
Sample
240905-y4vp3szamh
-
MD5
aa92bc82a2b3c733b305eef3ccb7ae6e
-
SHA1
b52729db10f5c62ea03f4280e16cbd5304487bcb
-
SHA256
ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5
-
SHA512
de5d0741196ae12200d35736dc37f7d7fb809e63378ba5b0b8f0da962c608037f2e9ff6b35a371fd0a0d7182da86f3338697c47fbd246a0c1831a14edbead8b3
-
SSDEEP
6144:ctBJHpf5eNmB7EEE+zwN6mdDHRIdJCBODBhMJWlN6w:ctBJHpfANmhrmdadJ5kO
Static task
static1
Behavioral task
behavioral1
Sample
ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5.exe
Resource
win11-20240802-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5
-
Size
400KB
-
MD5
aa92bc82a2b3c733b305eef3ccb7ae6e
-
SHA1
b52729db10f5c62ea03f4280e16cbd5304487bcb
-
SHA256
ee9e9a1840ff7f83b91b8eb3fc1e03df51aee5a94ac9cb3c63c0a37a9f3fcdd5
-
SHA512
de5d0741196ae12200d35736dc37f7d7fb809e63378ba5b0b8f0da962c608037f2e9ff6b35a371fd0a0d7182da86f3338697c47fbd246a0c1831a14edbead8b3
-
SSDEEP
6144:ctBJHpf5eNmB7EEE+zwN6mdDHRIdJCBODBhMJWlN6w:ctBJHpfANmhrmdadJ5kO
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1