General

  • Target

    f8b84417b71a1e476b6195904ea2ca4007740d7de21540f25558efe5dcc1bda1

  • Size

    154KB

  • Sample

    210927-bfrbesfdcn

  • MD5

    43821f948f1e4c990a805803a51050d6

  • SHA1

    8b3704dbf59cafc8ab33902b6990907c2bb9b99a

  • SHA256

    f8b84417b71a1e476b6195904ea2ca4007740d7de21540f25558efe5dcc1bda1

  • SHA512

    e31e2b2841c7f0bb749a8594b7d98f68be3e03ab2ca04ebc095fbc36b5ccfac50cbf60938aa98a18630ec5c62282052bb89564f4e2448255e88bb62eb5df19e5

Malware Config

Targets

    • Target

      f8b84417b71a1e476b6195904ea2ca4007740d7de21540f25558efe5dcc1bda1

    • Size

      154KB

    • MD5

      43821f948f1e4c990a805803a51050d6

    • SHA1

      8b3704dbf59cafc8ab33902b6990907c2bb9b99a

    • SHA256

      f8b84417b71a1e476b6195904ea2ca4007740d7de21540f25558efe5dcc1bda1

    • SHA512

      e31e2b2841c7f0bb749a8594b7d98f68be3e03ab2ca04ebc095fbc36b5ccfac50cbf60938aa98a18630ec5c62282052bb89564f4e2448255e88bb62eb5df19e5

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks