General

  • Target

    a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95

  • Size

    154KB

  • Sample

    210926-3skg7afdbk

  • MD5

    731ed07c7e9152ff176cdc849d5ea6a9

  • SHA1

    384a9ceaf5dc5cc4fafc61f32137d39fdfffd362

  • SHA256

    a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95

  • SHA512

    63a1f5ce166559cd0ae895d76d6117fd28d6404c2f2bd1e710dfd94310b012417ab9a78312aa31a43eddf94ff1d47c4461a19c8ab69e9ffb3bd22e46971d52ad

Malware Config

Targets

    • Target

      a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95

    • Size

      154KB

    • MD5

      731ed07c7e9152ff176cdc849d5ea6a9

    • SHA1

      384a9ceaf5dc5cc4fafc61f32137d39fdfffd362

    • SHA256

      a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95

    • SHA512

      63a1f5ce166559cd0ae895d76d6117fd28d6404c2f2bd1e710dfd94310b012417ab9a78312aa31a43eddf94ff1d47c4461a19c8ab69e9ffb3bd22e46971d52ad

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)

      suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks