General

  • Target

    file.exe

  • Size

    241KB

  • Sample

    221220-swbpcaab96

  • MD5

    3b53587307822e59eb2ac5c1849263c7

  • SHA1

    ccdfdf6ada38de1c9e7784fcc8852ebf58c5b940

  • SHA256

    56620ac330bd56eedb5dab95166a9b128bcb09783ac67caea3e84c8f218a0c8e

  • SHA512

    51986ad6bdeca247f3dbc48d4018fcd34dd39d8a16141ade4bd928537ffc68cdcdf692948b3b8b9d66fe5522b2361c2fdcfb7e4832e0fffbf381c1b83e1baeee

  • SSDEEP

    3072:BX8Gj9rLYT6iIqR5tWeAGf7zFrO3pUM0l3ChMLu/NHKH3SB7b/0w9yNHCDml:lV5rLYT6iIuWVK7BvyfHKXSZriCa

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      241KB

    • MD5

      3b53587307822e59eb2ac5c1849263c7

    • SHA1

      ccdfdf6ada38de1c9e7784fcc8852ebf58c5b940

    • SHA256

      56620ac330bd56eedb5dab95166a9b128bcb09783ac67caea3e84c8f218a0c8e

    • SHA512

      51986ad6bdeca247f3dbc48d4018fcd34dd39d8a16141ade4bd928537ffc68cdcdf692948b3b8b9d66fe5522b2361c2fdcfb7e4832e0fffbf381c1b83e1baeee

    • SSDEEP

      3072:BX8Gj9rLYT6iIqR5tWeAGf7zFrO3pUM0l3ChMLu/NHKH3SB7b/0w9yNHCDml:lV5rLYT6iIuWVK7BvyfHKXSZriCa

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks