General

  • Target

    77de9b20cf3371f1fbf156b7628cbe845f688c155f28cc6d28420541f64177f3

  • Size

    268KB

  • Sample

    220123-vhkq7sgcb7

  • MD5

    f31527eb112262f12f4ab1c7339f36c3

  • SHA1

    f99f2c3753ab39820ad2bb52b6e568b1fa0c2321

  • SHA256

    77de9b20cf3371f1fbf156b7628cbe845f688c155f28cc6d28420541f64177f3

  • SHA512

    104ec158fd1aa9be2ce3b8b703445268724697011c27e044da54bcaa116ecb6e3509c2b8adc8e95d54e750d2af094eb06330f847e67eb6e5bba5003ecad27439

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      77de9b20cf3371f1fbf156b7628cbe845f688c155f28cc6d28420541f64177f3

    • Size

      268KB

    • MD5

      f31527eb112262f12f4ab1c7339f36c3

    • SHA1

      f99f2c3753ab39820ad2bb52b6e568b1fa0c2321

    • SHA256

      77de9b20cf3371f1fbf156b7628cbe845f688c155f28cc6d28420541f64177f3

    • SHA512

      104ec158fd1aa9be2ce3b8b703445268724697011c27e044da54bcaa116ecb6e3509c2b8adc8e95d54e750d2af094eb06330f847e67eb6e5bba5003ecad27439

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks