General
-
Target
18954491000.zip
-
Size
123KB
-
Sample
240911-pxz7js1bnp
-
MD5
43728e6202b0927bd2602752361c7e28
-
SHA1
9b82e1014407ce5ddbf8ba836112aeeb05e87d93
-
SHA256
74f055ccb9d657d623b62d41f22317c883d22e2cf4496b54d0d6ba5d1358d426
-
SHA512
c1838e650b78cb21a3426ee01f1f96df70e2b5832ed6b32429afff0485c6832c0f7085cde4df4f4c81297789d7805b55a8550f6f9aa0541762c57fb4c3ea7e7c
-
SSDEEP
3072:xCwN+NDnpUvjV7oKo7z3qDTCoOrDGCm46US:wrNDpUrVXo7z++Qd/US
Behavioral task
behavioral1
Sample
50755e3eb1a407ef762cf957b272b483b314e911712c9e177b377efc8b1b5ea8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50755e3eb1a407ef762cf957b272b483b314e911712c9e177b377efc8b1b5ea8.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
50755e3eb1a407ef762cf957b272b483b314e911712c9e177b377efc8b1b5ea8
-
Size
13.2MB
-
MD5
5c22dd0023f2924fd7804a0ddbf7ae78
-
SHA1
280c5a888f5e30d0858b809611c47308b4e8bab4
-
SHA256
50755e3eb1a407ef762cf957b272b483b314e911712c9e177b377efc8b1b5ea8
-
SHA512
437e049e5ba7477b857b57f56f038f1f7d33e9edc78a5ac853eec6604aabe1eea801e45d4b9655aac230e5885a3a1e920d1b2d6409a215934f2768d0e167e254
-
SSDEEP
6144:UDVCynACXF+pI0zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzP:k8vmF+p
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2