General

  • Target

    63e0eef773d95c08c4c766e80c6199b867244d03e54060dfbecd4a2b7219a44d

  • Size

    287KB

  • Sample

    220614-vwq55scbg4

  • MD5

    c0bc281633cf64149b8a91c93ff55cb4

  • SHA1

    8eb252d59bfc628c91f4473d1e6d29197cfd76fd

  • SHA256

    63e0eef773d95c08c4c766e80c6199b867244d03e54060dfbecd4a2b7219a44d

  • SHA512

    8df882529fb2be1e58744f2c8225c41a41d3952cfa567c1f65de8e48c82a583515bc15e10dec060e8b3e24c2c34c472f047b3408354e213e719245a49584cb1b

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      63e0eef773d95c08c4c766e80c6199b867244d03e54060dfbecd4a2b7219a44d

    • Size

      287KB

    • MD5

      c0bc281633cf64149b8a91c93ff55cb4

    • SHA1

      8eb252d59bfc628c91f4473d1e6d29197cfd76fd

    • SHA256

      63e0eef773d95c08c4c766e80c6199b867244d03e54060dfbecd4a2b7219a44d

    • SHA512

      8df882529fb2be1e58744f2c8225c41a41d3952cfa567c1f65de8e48c82a583515bc15e10dec060e8b3e24c2c34c472f047b3408354e213e719245a49584cb1b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks