General

  • Target

    6d916dbb2d4e1841b92b056a4decf35c528e1d9ed0ced7db8097ebe283ff0fc7

  • Size

    321KB

  • Sample

    230107-y1haksaa3z

  • MD5

    1a6066d8b20352b1c9b472e8b044df13

  • SHA1

    4f7422dadfd481148db3fcd9e9e0ecb43eb00746

  • SHA256

    6d916dbb2d4e1841b92b056a4decf35c528e1d9ed0ced7db8097ebe283ff0fc7

  • SHA512

    a8c9670859f5ab9c0ecf3d01eaeef3c2b047b00a2a4b804a5582d56422a4aceaae5495bae750118481c0573a7ab86204c3190e416711ebe14ddb1aa9b234a856

  • SSDEEP

    6144:ijHJxuLy/3u8ryU2/fAM4MS/sivsEi6WbP:ijHJAe/3u8rfuoMeECi

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      6d916dbb2d4e1841b92b056a4decf35c528e1d9ed0ced7db8097ebe283ff0fc7

    • Size

      321KB

    • MD5

      1a6066d8b20352b1c9b472e8b044df13

    • SHA1

      4f7422dadfd481148db3fcd9e9e0ecb43eb00746

    • SHA256

      6d916dbb2d4e1841b92b056a4decf35c528e1d9ed0ced7db8097ebe283ff0fc7

    • SHA512

      a8c9670859f5ab9c0ecf3d01eaeef3c2b047b00a2a4b804a5582d56422a4aceaae5495bae750118481c0573a7ab86204c3190e416711ebe14ddb1aa9b234a856

    • SSDEEP

      6144:ijHJxuLy/3u8ryU2/fAM4MS/sivsEi6WbP:ijHJAe/3u8rfuoMeECi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks