General

  • Target

    63c0b4af1c21767dc05a766c2481ea4c5b75e2e735c37ac268469cb18f050a76

  • Size

    300KB

  • Sample

    230106-3d3efscc29

  • MD5

    11c3ea12ec15b719333c644f4165442b

  • SHA1

    e12140a3580ec9d9a38c45819de4e2de784407d0

  • SHA256

    63c0b4af1c21767dc05a766c2481ea4c5b75e2e735c37ac268469cb18f050a76

  • SHA512

    abaadd38d73ee3f72170494f87fa56eef91e28393f36d7f70556b4c73e85df15097eb29434496fae76fb4c9859960d45173b1d8698d61c3199c6a25a208beb6e

  • SSDEEP

    6144:1VLJzN4OMDdeKv4Yx/Vfrii7f+rwWiU0BJ:1VtzNBadeKnVfrH7f+rwWiUS

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      63c0b4af1c21767dc05a766c2481ea4c5b75e2e735c37ac268469cb18f050a76

    • Size

      300KB

    • MD5

      11c3ea12ec15b719333c644f4165442b

    • SHA1

      e12140a3580ec9d9a38c45819de4e2de784407d0

    • SHA256

      63c0b4af1c21767dc05a766c2481ea4c5b75e2e735c37ac268469cb18f050a76

    • SHA512

      abaadd38d73ee3f72170494f87fa56eef91e28393f36d7f70556b4c73e85df15097eb29434496fae76fb4c9859960d45173b1d8698d61c3199c6a25a208beb6e

    • SSDEEP

      6144:1VLJzN4OMDdeKv4Yx/Vfrii7f+rwWiU0BJ:1VtzNBadeKnVfrH7f+rwWiUS

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks