General

  • Target

    file.exe

  • Size

    228KB

  • Sample

    221221-qk3ycacc99

  • MD5

    d5cfeee4ae0f78d5bbf5ec4dbd773a4e

  • SHA1

    cc9042592f69c49b9ac737ed671f7a3767eb32c5

  • SHA256

    3d916d4606e5194251917b1b85458a7d82664b4fb9cf7cd6fbe7a0d8e9a09d19

  • SHA512

    a6b20ddced8c3ca588f7c6ab53eddef403e2b06290d4d81dadd225b69a8e6dd8ff22525b48b30f404eb6764604a475fb426600d2b8eae28447d03f837791e1ad

  • SSDEEP

    3072:L5ePB4OLEyP5diSEzZNJe47X0m19edrLW4P84nqgk6AcNQK1+eJV5u4z:wP5LEzzZa4b0mHgW85q96AeRu4

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      228KB

    • MD5

      d5cfeee4ae0f78d5bbf5ec4dbd773a4e

    • SHA1

      cc9042592f69c49b9ac737ed671f7a3767eb32c5

    • SHA256

      3d916d4606e5194251917b1b85458a7d82664b4fb9cf7cd6fbe7a0d8e9a09d19

    • SHA512

      a6b20ddced8c3ca588f7c6ab53eddef403e2b06290d4d81dadd225b69a8e6dd8ff22525b48b30f404eb6764604a475fb426600d2b8eae28447d03f837791e1ad

    • SSDEEP

      3072:L5ePB4OLEyP5diSEzZNJe47X0m19edrLW4P84nqgk6AcNQK1+eJV5u4z:wP5LEzzZa4b0mHgW85q96AeRu4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks