General

  • Target

    84e5ac849e237c58ccbc793504d9edd78ce3c227dd5cf0c7211d46957af543af

  • Size

    157KB

  • Sample

    210926-tkbewafabr

  • MD5

    7fa3f7279f96b0277cd26d41b9fc6075

  • SHA1

    2f22d98b8225670ed14634fc270521a2009929cb

  • SHA256

    84e5ac849e237c58ccbc793504d9edd78ce3c227dd5cf0c7211d46957af543af

  • SHA512

    4b825292064769bafb637e99af7328bc9bb982e3c654bd5628f2b8c8b8f1b7bcf3555a8b72b9e8e429a665a83e7680711dbe1e459c821b553bf4f2af5bc41c13

Malware Config

Targets

    • Target

      84e5ac849e237c58ccbc793504d9edd78ce3c227dd5cf0c7211d46957af543af

    • Size

      157KB

    • MD5

      7fa3f7279f96b0277cd26d41b9fc6075

    • SHA1

      2f22d98b8225670ed14634fc270521a2009929cb

    • SHA256

      84e5ac849e237c58ccbc793504d9edd78ce3c227dd5cf0c7211d46957af543af

    • SHA512

      4b825292064769bafb637e99af7328bc9bb982e3c654bd5628f2b8c8b8f1b7bcf3555a8b72b9e8e429a665a83e7680711dbe1e459c821b553bf4f2af5bc41c13

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks