General

  • Target

    file

  • Size

    214KB

  • Sample

    221220-whvrvadf3y

  • MD5

    a0541738736e1430828f2197931f69ce

  • SHA1

    e5d92d4c571b2545ee6dcde5d3540b1b90248e5c

  • SHA256

    2ec4c6205268f910a9c01c95cf44a63134e672135536ad7d915b9cddb3353a4b

  • SHA512

    535de2832fe9f00a33b9d293d8089fa2bd25c3f97a18a02c125a5876bd1b28dcae4748c527b867aef4d34ee4b32cb75b397032e5f381a36066a575193c0186f3

  • SSDEEP

    3072:LWLpZiLe2BXV532Ql4KL5rsQKGFD0ztML2wY7b/byXGxNHCDml:aLSL5oQl4KL5rsQ5D0ZA2dzyXG7Ca

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file

    • Size

      214KB

    • MD5

      a0541738736e1430828f2197931f69ce

    • SHA1

      e5d92d4c571b2545ee6dcde5d3540b1b90248e5c

    • SHA256

      2ec4c6205268f910a9c01c95cf44a63134e672135536ad7d915b9cddb3353a4b

    • SHA512

      535de2832fe9f00a33b9d293d8089fa2bd25c3f97a18a02c125a5876bd1b28dcae4748c527b867aef4d34ee4b32cb75b397032e5f381a36066a575193c0186f3

    • SSDEEP

      3072:LWLpZiLe2BXV532Ql4KL5rsQKGFD0ztML2wY7b/byXGxNHCDml:aLSL5oQl4KL5rsQ5D0ZA2dzyXG7Ca

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks