General

  • Target

    d6371b26f0bfb486de78d9617bafb8a5c64534a13ef2fb1dfce67d782d77f5e3

  • Size

    327KB

  • Sample

    220121-lnsjkafac2

  • MD5

    40361ac1f920b4a827d220d0d9f4375b

  • SHA1

    4bbb651b1d9872365031216e69201d890834dc5d

  • SHA256

    d6371b26f0bfb486de78d9617bafb8a5c64534a13ef2fb1dfce67d782d77f5e3

  • SHA512

    2ecb8454df2881686250454779c6e4ba7ab39d482910419a34474ab9e7c176a318a2d8a7c351261d44ac4e59c629bc79a6aed73ba956f0a0c292503937d2ad21

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      d6371b26f0bfb486de78d9617bafb8a5c64534a13ef2fb1dfce67d782d77f5e3

    • Size

      327KB

    • MD5

      40361ac1f920b4a827d220d0d9f4375b

    • SHA1

      4bbb651b1d9872365031216e69201d890834dc5d

    • SHA256

      d6371b26f0bfb486de78d9617bafb8a5c64534a13ef2fb1dfce67d782d77f5e3

    • SHA512

      2ecb8454df2881686250454779c6e4ba7ab39d482910419a34474ab9e7c176a318a2d8a7c351261d44ac4e59c629bc79a6aed73ba956f0a0c292503937d2ad21

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks