General

  • Target

    a3d4f3ddda48e3ed9d7dff71122b7ad4dc970607634337848194fbf733c8244d

  • Size

    236KB

  • Sample

    210504-72xq2vy7bj

  • MD5

    796b323f48e37e0bfa232bb272dd2bc0

  • SHA1

    a8aae7ed34195f76ecd5bc21e5a0dbb9b0f703a7

  • SHA256

    a3d4f3ddda48e3ed9d7dff71122b7ad4dc970607634337848194fbf733c8244d

  • SHA512

    40c82f1ca61e3a0431cbd211bceb45adb0100c21ff851bbd95968aa222608470e6573eb803f17d6029c0698b536cbd534a071742b623fbdb1b9faf1568c1cd8c

Malware Config

Targets

    • Target

      a3d4f3ddda48e3ed9d7dff71122b7ad4dc970607634337848194fbf733c8244d

    • Size

      236KB

    • MD5

      796b323f48e37e0bfa232bb272dd2bc0

    • SHA1

      a8aae7ed34195f76ecd5bc21e5a0dbb9b0f703a7

    • SHA256

      a3d4f3ddda48e3ed9d7dff71122b7ad4dc970607634337848194fbf733c8244d

    • SHA512

      40c82f1ca61e3a0431cbd211bceb45adb0100c21ff851bbd95968aa222608470e6573eb803f17d6029c0698b536cbd534a071742b623fbdb1b9faf1568c1cd8c

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks