General

  • Target

    7035d632ff8b10f819929e6cac09cf19.exe

  • Size

    154KB

  • Sample

    201229-jmzcdmzkva

  • MD5

    7035d632ff8b10f819929e6cac09cf19

  • SHA1

    fd147614ee008c1daa3eece110ceff33ee15a188

  • SHA256

    92430a767afd2c33e7d5999d3238c03206bafde5b3e5f22b2bb53b7c6e1f659f

  • SHA512

    596b9b2f16b2f9ab77fac2101c72e598e263ef9988a9f818ae5d1a23c10d75cacde3a02de4de0ce75a9884e205ed86db6fb0306cb3eceb113894a5b64dc98ac7

Malware Config

Targets

    • Target

      7035d632ff8b10f819929e6cac09cf19.exe

    • Size

      154KB

    • MD5

      7035d632ff8b10f819929e6cac09cf19

    • SHA1

      fd147614ee008c1daa3eece110ceff33ee15a188

    • SHA256

      92430a767afd2c33e7d5999d3238c03206bafde5b3e5f22b2bb53b7c6e1f659f

    • SHA512

      596b9b2f16b2f9ab77fac2101c72e598e263ef9988a9f818ae5d1a23c10d75cacde3a02de4de0ce75a9884e205ed86db6fb0306cb3eceb113894a5b64dc98ac7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Tasks