General

  • Target

    d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5

  • Size

    187KB

  • Sample

    220923-yqhhlabcbn

  • MD5

    ecf7961c555776326dbf06a6fdd12454

  • SHA1

    9cf0c35e29c6cd70cc7ca99963d7e610ff86bf8a

  • SHA256

    d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5

  • SHA512

    d23a82a93220b036316fc43030d3e4a1410675db7ca7796c7024d8aebc70a164c0ed68bbd6e7742a83a5ce7248371f34f7fc483ed5b10f19df754bdd1ddfff1b

  • SSDEEP

    3072:zkXgA1L2GgJ/5Ai5DHHlxKW4DlPLya5G+sRB51gA/Pk44x:aL2JdnTUDlPLyqGf1g

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5

    • Size

      187KB

    • MD5

      ecf7961c555776326dbf06a6fdd12454

    • SHA1

      9cf0c35e29c6cd70cc7ca99963d7e610ff86bf8a

    • SHA256

      d2778f43fbb2585da75e26db5b513e4cd9723b6f6ff2b79f8a2a78f86df808e5

    • SHA512

      d23a82a93220b036316fc43030d3e4a1410675db7ca7796c7024d8aebc70a164c0ed68bbd6e7742a83a5ce7248371f34f7fc483ed5b10f19df754bdd1ddfff1b

    • SSDEEP

      3072:zkXgA1L2GgJ/5Ai5DHHlxKW4DlPLya5G+sRB51gA/Pk44x:aL2JdnTUDlPLyqGf1g

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks