General

  • Target

    file

  • Size

    230KB

  • Sample

    221025-exzwnsbefk

  • MD5

    b23d377a460657f8d7a553499678f36a

  • SHA1

    34da18ca86ee206dd9178bd6c66d5eca7a8e80a8

  • SHA256

    00b043b01844a78e51e3cdf5bb2b789e0eab9ff63e2cffbff8f3cf38ab099989

  • SHA512

    28888a061f0d5d8afea392530025c6f4283b14a855e48e7c0a0c02ba898e481b3c3987531047dd54d624289ac248be1572b8a10626c2fae91dee03c0c04a3f4f

  • SSDEEP

    3072:xXIOQLW5EgrY5tEQfDhxQludVHFBUdE4xd6KTWZKKlB0Xp36rasFVV9hdl:VTQLCRrcEQNWluhFB6r6muSzMVbdl

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file

    • Size

      230KB

    • MD5

      b23d377a460657f8d7a553499678f36a

    • SHA1

      34da18ca86ee206dd9178bd6c66d5eca7a8e80a8

    • SHA256

      00b043b01844a78e51e3cdf5bb2b789e0eab9ff63e2cffbff8f3cf38ab099989

    • SHA512

      28888a061f0d5d8afea392530025c6f4283b14a855e48e7c0a0c02ba898e481b3c3987531047dd54d624289ac248be1572b8a10626c2fae91dee03c0c04a3f4f

    • SSDEEP

      3072:xXIOQLW5EgrY5tEQfDhxQludVHFBUdE4xd6KTWZKKlB0Xp36rasFVV9hdl:VTQLCRrcEQNWluhFB6r6muSzMVbdl

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks