General

  • Target

    1c4c9326b10da5bdf6e7bcf110bd823e4df461faf0abda209368c489399649e7

  • Size

    302KB

  • Sample

    230107-ehk4zacf73

  • MD5

    9cb2c2717925b9261ce042fd36b3b0e8

  • SHA1

    61ddef9d7cd6e45ecc9fe4d114c6a85655a36f16

  • SHA256

    1c4c9326b10da5bdf6e7bcf110bd823e4df461faf0abda209368c489399649e7

  • SHA512

    5f8ee2c1129d27f36c1ced0b24aac7729fe914a7f2313c196c0ad1a12ab5f1d4ac52dbf73ade22b111b1c5ce634ee848fd92a51d40079356f7dba2d569ceb7bb

  • SSDEEP

    3072:q3XveLoAt4058zznITumFpuZJkMRDf4LH4Z5K9FRH6mwi6zSbBLmY:4GLo84FIK6pa8L45CSmwi6WboY

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      1c4c9326b10da5bdf6e7bcf110bd823e4df461faf0abda209368c489399649e7

    • Size

      302KB

    • MD5

      9cb2c2717925b9261ce042fd36b3b0e8

    • SHA1

      61ddef9d7cd6e45ecc9fe4d114c6a85655a36f16

    • SHA256

      1c4c9326b10da5bdf6e7bcf110bd823e4df461faf0abda209368c489399649e7

    • SHA512

      5f8ee2c1129d27f36c1ced0b24aac7729fe914a7f2313c196c0ad1a12ab5f1d4ac52dbf73ade22b111b1c5ce634ee848fd92a51d40079356f7dba2d569ceb7bb

    • SSDEEP

      3072:q3XveLoAt4058zznITumFpuZJkMRDf4LH4Z5K9FRH6mwi6zSbBLmY:4GLo84FIK6pa8L45CSmwi6WboY

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks