General

  • Target

    file.exe

  • Size

    229KB

  • Sample

    221226-yjne9sdf78

  • MD5

    02a7964a1ebf9ab81f10ff5dd545c818

  • SHA1

    14701f87652b8432e939612e0f60d4107e1f3550

  • SHA256

    d495472d03951f9b90844d242b47371df897a430923a9512cb579e6b176128b5

  • SHA512

    68716bb373ddba94741ca1db147eaeea57817a11ce60a5ae2c107215e551c53b7f3327e108154d2b1a82bceb5e927b047024c911327547ad6d9b300d38edf101

  • SSDEEP

    3072:CIpxLZNs5+95/hkhrxQwpAg4oY7qjLptw+V+Y700:PLZ2LQOAwYqHw+Vl7l

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      229KB

    • MD5

      02a7964a1ebf9ab81f10ff5dd545c818

    • SHA1

      14701f87652b8432e939612e0f60d4107e1f3550

    • SHA256

      d495472d03951f9b90844d242b47371df897a430923a9512cb579e6b176128b5

    • SHA512

      68716bb373ddba94741ca1db147eaeea57817a11ce60a5ae2c107215e551c53b7f3327e108154d2b1a82bceb5e927b047024c911327547ad6d9b300d38edf101

    • SSDEEP

      3072:CIpxLZNs5+95/hkhrxQwpAg4oY7qjLptw+V+Y700:PLZ2LQOAwYqHw+Vl7l

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks