General
-
Target
f69e35008ad31989cad3811a319b264b.bin
-
Size
136KB
-
Sample
240928-swar2ssfrq
-
MD5
001b83f5f63bdddf7b9890132205ffb3
-
SHA1
bcaa796c181ad2e1eac7d69fbcec79ace70f930a
-
SHA256
c1cbda06fa09ad8b052567ce3a5d40e9916b024db8ef190afa0bab620b1cee62
-
SHA512
54bc95c9fb698272568e2ab1aeabdd992f7fa39d5ef62d2b2b46d56c00c4ec96e6453bbfc4e5e18aa1cbe389347a861fd757dec5d8da490f9d21232a8ede8f46
-
SSDEEP
3072:TI/HIR//+aWWGKsCuysrZTQrijOqkIdiLTufNKKs:M/Hw/+JWhsdysrZTxkIWaf8
Static task
static1
Behavioral task
behavioral1
Sample
e6c0fd16f7e1b1b73832a0c559eb5d089585027254bdf184aca5b60af8ac1487.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6c0fd16f7e1b1b73832a0c559eb5d089585027254bdf184aca5b60af8ac1487.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Targets
-
-
Target
e6c0fd16f7e1b1b73832a0c559eb5d089585027254bdf184aca5b60af8ac1487.exe
-
Size
194KB
-
MD5
f69e35008ad31989cad3811a319b264b
-
SHA1
dac099de5c3d43638b13318e7e082f0db6f61884
-
SHA256
e6c0fd16f7e1b1b73832a0c559eb5d089585027254bdf184aca5b60af8ac1487
-
SHA512
a00e1c846883064b76bcadb88bb57db4358d0d096d1d7fec329e90f57ee5f77699bc3e6b4b5f571305850e218affe80d42515a3cbbcd02db2f6a1d62a72d832e
-
SSDEEP
3072:IaXTO21fKhR2MbLUYUQvkWnp95DhO2Wv3yfrWIatkh8MKL5PHr8A8HOgzb3V:9XTpUh/bLdTM6AvCzWIatkh8MM5OV
-
Creates new service(s)
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2