General

  • Target

    a8b62c5eeaf98d0e7b13c60a39f92904182c7de8dd330f9b2eb7382642eeb7bf

  • Size

    329KB

  • Sample

    220121-xkaecsaga8

  • MD5

    18fd70b5d281f4f91aed02fc9bf17a8d

  • SHA1

    36b6ba41d1f93b1d1cba0052bce17bd4908b73a4

  • SHA256

    a8b62c5eeaf98d0e7b13c60a39f92904182c7de8dd330f9b2eb7382642eeb7bf

  • SHA512

    f83f377f34370cd9e86226d3c8b5e9b921808304d04719af0887585b8c51f556f779a3aff11d37d3c103110bf0560342b7ea6700fc4cbbabd7432fb0cbe4104d

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      a8b62c5eeaf98d0e7b13c60a39f92904182c7de8dd330f9b2eb7382642eeb7bf

    • Size

      329KB

    • MD5

      18fd70b5d281f4f91aed02fc9bf17a8d

    • SHA1

      36b6ba41d1f93b1d1cba0052bce17bd4908b73a4

    • SHA256

      a8b62c5eeaf98d0e7b13c60a39f92904182c7de8dd330f9b2eb7382642eeb7bf

    • SHA512

      f83f377f34370cd9e86226d3c8b5e9b921808304d04719af0887585b8c51f556f779a3aff11d37d3c103110bf0560342b7ea6700fc4cbbabd7432fb0cbe4104d

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks