General

  • Target

    50825c2bfc803e61e4bf8f1c7a5f624773bc7fa93a7b7f33332bc2538cb7374c

  • Size

    185KB

  • Sample

    220613-bmfs9shbd3

  • MD5

    b4dbd9662269bedb3fe1c976bb9849bb

  • SHA1

    3f727ee4a95e36e067fdb5561c85a587933fef14

  • SHA256

    50825c2bfc803e61e4bf8f1c7a5f624773bc7fa93a7b7f33332bc2538cb7374c

  • SHA512

    a51e47003c53691c83000a169a61e56e62c900212a633400406a6d0b486d6bc1ca0a8f4a78290068de332fd149191c6f8af18fc32bdd121335f103236c27e66d

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      50825c2bfc803e61e4bf8f1c7a5f624773bc7fa93a7b7f33332bc2538cb7374c

    • Size

      185KB

    • MD5

      b4dbd9662269bedb3fe1c976bb9849bb

    • SHA1

      3f727ee4a95e36e067fdb5561c85a587933fef14

    • SHA256

      50825c2bfc803e61e4bf8f1c7a5f624773bc7fa93a7b7f33332bc2538cb7374c

    • SHA512

      a51e47003c53691c83000a169a61e56e62c900212a633400406a6d0b486d6bc1ca0a8f4a78290068de332fd149191c6f8af18fc32bdd121335f103236c27e66d

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks