General

  • Target

    file.exe

  • Size

    265KB

  • Sample

    230108-p3gmdsha3v

  • MD5

    7364153ac768f974a449e9279673856f

  • SHA1

    6b8b4e81cf26e4956e9249a3fd6d706c6d5915c2

  • SHA256

    efd2425ed515feb6c6010e9f7710c48bfff3e2dba0838284d591a2f1947089b7

  • SHA512

    95feb050666656d336cd7e098612da0e0b577ccd938c4a8b963ef65afc0111e3b8cecf48d7d09cfea0929efcfed9c2c43ee854e96931959c20c74b5707e12614

  • SSDEEP

    3072:6Xh2BaHgLX1N1Db4H85RDm0jIwvsTF0ZaU/ofnMJjozpxO5lUZNTKXWPr0sdF:asLXBb4H90Q0Za2JjozgaOuN

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      265KB

    • MD5

      7364153ac768f974a449e9279673856f

    • SHA1

      6b8b4e81cf26e4956e9249a3fd6d706c6d5915c2

    • SHA256

      efd2425ed515feb6c6010e9f7710c48bfff3e2dba0838284d591a2f1947089b7

    • SHA512

      95feb050666656d336cd7e098612da0e0b577ccd938c4a8b963ef65afc0111e3b8cecf48d7d09cfea0929efcfed9c2c43ee854e96931959c20c74b5707e12614

    • SSDEEP

      3072:6Xh2BaHgLX1N1Db4H85RDm0jIwvsTF0ZaU/ofnMJjozpxO5lUZNTKXWPr0sdF:asLXBb4H90Q0Za2JjozgaOuN

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks