General

  • Target

    fa224d582cbc7477d5b17576baa7570483cad0be6ff5857d5ef79838ba3d5add

  • Size

    12.0MB

  • Sample

    211026-1jh7naada4

  • MD5

    769d690d845642d89e87b512cdd60338

  • SHA1

    ad65ac262fc358d9a10cc8089e23373b7f4aa3bb

  • SHA256

    fa224d582cbc7477d5b17576baa7570483cad0be6ff5857d5ef79838ba3d5add

  • SHA512

    79b7b168a5d1e9653fa1069ebb1209a14b4bc689f700e42da2a82487a8f71c5965219b1afd80cdcbadbfa98f77f01908fc9c37424f972ed5b50b68e059a02973

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      fa224d582cbc7477d5b17576baa7570483cad0be6ff5857d5ef79838ba3d5add

    • Size

      12.0MB

    • MD5

      769d690d845642d89e87b512cdd60338

    • SHA1

      ad65ac262fc358d9a10cc8089e23373b7f4aa3bb

    • SHA256

      fa224d582cbc7477d5b17576baa7570483cad0be6ff5857d5ef79838ba3d5add

    • SHA512

      79b7b168a5d1e9653fa1069ebb1209a14b4bc689f700e42da2a82487a8f71c5965219b1afd80cdcbadbfa98f77f01908fc9c37424f972ed5b50b68e059a02973

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks