General

  • Target

    95eb626d9714e44e8aee142535e80e19763a144d3ff58654b0d26bedece43efb

  • Size

    10.4MB

  • Sample

    210509-m8134566dx

  • MD5

    7b00e136ab113f2f4efcbdd546eea644

  • SHA1

    46932915dd309e69152fd2e855c8c546d7f7c517

  • SHA256

    95eb626d9714e44e8aee142535e80e19763a144d3ff58654b0d26bedece43efb

  • SHA512

    2510d7236b22d1084335c11731a55cb049fae0fe7a6278b0c23a03174f125701ec1a6bed713b0d659b9178e4a9974c1a96fe4237c28e7f66a6937207afa363d9

Malware Config

Targets

    • Target

      95eb626d9714e44e8aee142535e80e19763a144d3ff58654b0d26bedece43efb

    • Size

      10.4MB

    • MD5

      7b00e136ab113f2f4efcbdd546eea644

    • SHA1

      46932915dd309e69152fd2e855c8c546d7f7c517

    • SHA256

      95eb626d9714e44e8aee142535e80e19763a144d3ff58654b0d26bedece43efb

    • SHA512

      2510d7236b22d1084335c11731a55cb049fae0fe7a6278b0c23a03174f125701ec1a6bed713b0d659b9178e4a9974c1a96fe4237c28e7f66a6937207afa363d9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks