General

  • Target

    1b91a40fdbff1cc2daa2ff7c820b384a259a52f286eca1086842744b4c2046d2

  • Size

    192KB

  • Sample

    221202-bfdekace8s

  • MD5

    b7c3428ebe5224330a9e2bec8b334c34

  • SHA1

    7f839b17f850c365a3fd8314a2ad275fb26308cf

  • SHA256

    1b91a40fdbff1cc2daa2ff7c820b384a259a52f286eca1086842744b4c2046d2

  • SHA512

    e3293bac8dc86173a25a11e997745b1dd57bd809cd762e7ff9f0066d8482a0a123e899890c4980d9e1e2b064f945b0984ca5ed205ac2a2237e8b92af245ae421

  • SSDEEP

    3072:tBQOggA0jE6vI5iDc3NvbmzkxR+fn3uW+5Rs9E3AZxpR/rB48k:o+jR9c3NTmzus/Tvpdi

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      1b91a40fdbff1cc2daa2ff7c820b384a259a52f286eca1086842744b4c2046d2

    • Size

      192KB

    • MD5

      b7c3428ebe5224330a9e2bec8b334c34

    • SHA1

      7f839b17f850c365a3fd8314a2ad275fb26308cf

    • SHA256

      1b91a40fdbff1cc2daa2ff7c820b384a259a52f286eca1086842744b4c2046d2

    • SHA512

      e3293bac8dc86173a25a11e997745b1dd57bd809cd762e7ff9f0066d8482a0a123e899890c4980d9e1e2b064f945b0984ca5ed205ac2a2237e8b92af245ae421

    • SSDEEP

      3072:tBQOggA0jE6vI5iDc3NvbmzkxR+fn3uW+5Rs9E3AZxpR/rB48k:o+jR9c3NTmzus/Tvpdi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

New Service

1
T1050

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks