General

  • Target

    dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606

  • Size

    323KB

  • Sample

    230107-zvdkwaeg36

  • MD5

    35b01d3ca6074a927b19d4d1211116e3

  • SHA1

    096dc91d4f9ca7819e3ae284b10c8583c91e7feb

  • SHA256

    dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606

  • SHA512

    a4555b5def008e866f580eb301e57ea12f056a68b7646f7cbc8e5990f280a818db1dbb45e1eaa7b09d43d35e7b76d2b4d55d13606117363c6453ea9a0b47d321

  • SSDEEP

    6144:F2qGJT+LeGNaq0C+RTCMSYIfjtOMWdqMS/sX2Bi6Wbt:F2qGJKCGNaq0CJMlIfxgUEX2Bi

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606

    • Size

      323KB

    • MD5

      35b01d3ca6074a927b19d4d1211116e3

    • SHA1

      096dc91d4f9ca7819e3ae284b10c8583c91e7feb

    • SHA256

      dfec1d38acfcadeab311219064b22b316bb4e510e555859f98e43a18fe357606

    • SHA512

      a4555b5def008e866f580eb301e57ea12f056a68b7646f7cbc8e5990f280a818db1dbb45e1eaa7b09d43d35e7b76d2b4d55d13606117363c6453ea9a0b47d321

    • SSDEEP

      6144:F2qGJT+LeGNaq0C+RTCMSYIfjtOMWdqMS/sX2Bi6Wbt:F2qGJKCGNaq0CJMlIfxgUEX2Bi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks