General

  • Target

    file.exe

  • Size

    331KB

  • Sample

    221222-kq1saaeb67

  • MD5

    5ef24646699f555f39c222511eab2a94

  • SHA1

    6d39a1b241cf412ffa3ced440954c2a2de447474

  • SHA256

    7134362ae929ebed3bfb457151a49cc5a068f1f2b5a54692f27f6cd0a1ccca92

  • SHA512

    8539536f99b1aef01d1793ee50685d3224e2355eecd03f359156d0db45f9d1261340553d8b5955e02ca8c393643083da60bf5d7dfe2daf717629c4175dc0de5a

  • SSDEEP

    6144:RiomLGtrbupbES9NVYLoDdohClICA61hJFIJfVAVrwU+:sDKxbdcYsDd6P6PHgtyQ

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      331KB

    • MD5

      5ef24646699f555f39c222511eab2a94

    • SHA1

      6d39a1b241cf412ffa3ced440954c2a2de447474

    • SHA256

      7134362ae929ebed3bfb457151a49cc5a068f1f2b5a54692f27f6cd0a1ccca92

    • SHA512

      8539536f99b1aef01d1793ee50685d3224e2355eecd03f359156d0db45f9d1261340553d8b5955e02ca8c393643083da60bf5d7dfe2daf717629c4175dc0de5a

    • SSDEEP

      6144:RiomLGtrbupbES9NVYLoDdohClICA61hJFIJfVAVrwU+:sDKxbdcYsDd6P6PHgtyQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks