General

  • Target

    41ba8b23261f263ddf53c94df2c776bcf4b100c46f39bebaccd1e0ee54f696ab.zip

  • Size

    112KB

  • Sample

    221124-rgc37ach71

  • MD5

    e2c2dddca8abecd2ca992c8dd2f04479

  • SHA1

    4a40ef94e6924cd3bd1bfcc440a6cdb2f7bd5f9f

  • SHA256

    0fc4b958441efc3b8f7964c2d7055a8ddbd4f806f49c85ca7b279d91990101bf

  • SHA512

    7718aab2ee1a976e44ac9ee5df272731b7f1f7971eef308dcbcdc56c062d66a9c6f19965f2660ffc080bce0d201475aa365e241333ba0777f9a2adbf9a582730

  • SSDEEP

    3072:AFtVvCE6QDBxgz72VNBpKfv1+iombjuKdrKJF7oyey:a747INKHbHvuKdOJF7b7

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      41ba8b23261f263ddf53c94df2c776bcf4b100c46f39bebaccd1e0ee54f696ab.exe

    • Size

      164KB

    • MD5

      b4a23677748b413c396d816f0fc84330

    • SHA1

      598420f5aee2eca4a78e6cc0e1fb8a4cd2f5bf6d

    • SHA256

      41ba8b23261f263ddf53c94df2c776bcf4b100c46f39bebaccd1e0ee54f696ab

    • SHA512

      95a3e2a2b16000f599f7a535eb0b5ca5f45741d1e88bf78141ef687b6aec228acff847196c2ddfc1a75e2efe7d46469656e1449e6278539b17d25b9c8ea94339

    • SSDEEP

      3072:Da34z4WZ53xM3qg55qYe1xHng0fOCUGzo3D:D3X+3ZqhxXO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks