General

  • Target

    18d4cc9ab3c5c332ef5db292dca6023e2279182207a07303be8cdeb354e23cb6

  • Size

    264KB

  • Sample

    220912-xyyzwahgaq

  • MD5

    019609b761b59b8b4fb692ecddf01189

  • SHA1

    07739896b54bd15fd912ed92e74b504e259e5618

  • SHA256

    18d4cc9ab3c5c332ef5db292dca6023e2279182207a07303be8cdeb354e23cb6

  • SHA512

    588ea8ae907eb7ece5caa558545a6e2d8fcc0083281ac958c7cf0f69d1b8e7404d07821ffd73a276a9e3d7336107c8ffe46d9bae5360c13a191df817e87c75ef

  • SSDEEP

    6144:Z6CR6menyPXVN3qPP9xVMYxaYDvfGqUwFpIghMrgU6BAwz:UA30yv33qPP9zMYxaYD2qUwFp

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      18d4cc9ab3c5c332ef5db292dca6023e2279182207a07303be8cdeb354e23cb6

    • Size

      264KB

    • MD5

      019609b761b59b8b4fb692ecddf01189

    • SHA1

      07739896b54bd15fd912ed92e74b504e259e5618

    • SHA256

      18d4cc9ab3c5c332ef5db292dca6023e2279182207a07303be8cdeb354e23cb6

    • SHA512

      588ea8ae907eb7ece5caa558545a6e2d8fcc0083281ac958c7cf0f69d1b8e7404d07821ffd73a276a9e3d7336107c8ffe46d9bae5360c13a191df817e87c75ef

    • SSDEEP

      6144:Z6CR6menyPXVN3qPP9xVMYxaYDvfGqUwFpIghMrgU6BAwz:UA30yv33qPP9zMYxaYD2qUwFp

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks