General

  • Target

    abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

  • Size

    157KB

  • Sample

    210926-syk1ssfah8

  • MD5

    cd6e5ac889b0cc1a71bd010f1b58ec00

  • SHA1

    ef8533ce236484acce96615d8b1dd99a387212fc

  • SHA256

    abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

  • SHA512

    74f48a093c96c087bdde32c81cadaedd457acfa36fc17f64ff23ce0c303e83c489cce3e7610d565d2feba415638c00f451b6662cee5e2045c53d9bbed148e51b

Malware Config

Targets

    • Target

      abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

    • Size

      157KB

    • MD5

      cd6e5ac889b0cc1a71bd010f1b58ec00

    • SHA1

      ef8533ce236484acce96615d8b1dd99a387212fc

    • SHA256

      abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

    • SHA512

      74f48a093c96c087bdde32c81cadaedd457acfa36fc17f64ff23ce0c303e83c489cce3e7610d565d2feba415638c00f451b6662cee5e2045c53d9bbed148e51b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks