General

  • Target

    file.exe

  • Size

    192KB

  • Sample

    221026-pebfgaffen

  • MD5

    e84412e1df23061845e100185a471bbe

  • SHA1

    fb9b8cf7e46d901094ad9c610637c95db2e9644e

  • SHA256

    313f19f727c2177dafa039021ff2c0006bfdd055419abce3267f076b7f1f3ecb

  • SHA512

    d9d77484ed314e7581831314b725dacb64515fbf78fcd785574011c0e793c2cfc84881075b68ba547b537313564869c310b160bbe54e2983cdebbac221e2b842

  • SSDEEP

    6144:kOO0pQqVWLiXJ+n/X2mwbTr4VjPQ0LFcn:5OwQwWmXJy2FTr4dy

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      192KB

    • MD5

      e84412e1df23061845e100185a471bbe

    • SHA1

      fb9b8cf7e46d901094ad9c610637c95db2e9644e

    • SHA256

      313f19f727c2177dafa039021ff2c0006bfdd055419abce3267f076b7f1f3ecb

    • SHA512

      d9d77484ed314e7581831314b725dacb64515fbf78fcd785574011c0e793c2cfc84881075b68ba547b537313564869c310b160bbe54e2983cdebbac221e2b842

    • SSDEEP

      6144:kOO0pQqVWLiXJ+n/X2mwbTr4VjPQ0LFcn:5OwQwWmXJy2FTr4dy

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks