General

  • Target

    file.exe

  • Size

    229KB

  • Sample

    221221-q6dkkscd45

  • MD5

    4c7ae68d71d1ca4e4cde4b9c566794e6

  • SHA1

    76df7370cee95c58febca75562c86b18a7c5be7a

  • SHA256

    ab7527783636982ff35deaa7760d37b9ba5a8d1a8fd4809f88d60b0e3943926a

  • SHA512

    e5ee1937ed5e51b54d0aba2b2240a4a6f8eee1aa5b7dc347de611d40551a0dad0e1ac72e6f12e04cafc8bfd84e8b5d8bb2a04bbf53a9109d31456abcb998d3b0

  • SSDEEP

    3072:yhs+fLoAocT5tsfK8DlwHpbCI1MxkNBbTv+C1oLW4P84nMcNQK1+eJV5u4z:rgLxWK6GJbL9ZtIW85MeRu4

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      229KB

    • MD5

      4c7ae68d71d1ca4e4cde4b9c566794e6

    • SHA1

      76df7370cee95c58febca75562c86b18a7c5be7a

    • SHA256

      ab7527783636982ff35deaa7760d37b9ba5a8d1a8fd4809f88d60b0e3943926a

    • SHA512

      e5ee1937ed5e51b54d0aba2b2240a4a6f8eee1aa5b7dc347de611d40551a0dad0e1ac72e6f12e04cafc8bfd84e8b5d8bb2a04bbf53a9109d31456abcb998d3b0

    • SSDEEP

      3072:yhs+fLoAocT5tsfK8DlwHpbCI1MxkNBbTv+C1oLW4P84nMcNQK1+eJV5u4z:rgLxWK6GJbL9ZtIW85MeRu4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks