General

  • Target

    066793cde98c8983ec676ab7e848dd4e.bin

  • Size

    161KB

  • Sample

    230328-bdb4qagb49

  • MD5

    9f958d44922f33b418bcde50af2bf603

  • SHA1

    86c7d44505632617f19d5864262b56878b4d42ac

  • SHA256

    883fa89f2fd96ce552e767d9d5975e01f534dfeda72cd0d2522bdbdc8808b1e4

  • SHA512

    93b584760454edc5fef5ade354006011f9d7e25a088f3158c5530d87e2df2871bc860efaaa1445a2e69f7df0afa7b33b7d3b37d94e9b17aa18db698d46f4069c

  • SSDEEP

    3072:DbrHJHZsFM3OxygRUmowDuLwt1TwX/AvikXV1sDjII19SC9zmwcn3nDp:XrJuFBl9Vt1yBvn19fQVXDp

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      1062c7e1e883e164b85d224cefa62450e507f056fcf8924f133ca9b65abae360.exe

    • Size

      270KB

    • MD5

      066793cde98c8983ec676ab7e848dd4e

    • SHA1

      1d35175f44ae52a6238dc9ddd3acc6f6af8f5639

    • SHA256

      1062c7e1e883e164b85d224cefa62450e507f056fcf8924f133ca9b65abae360

    • SHA512

      139c0fa8ae09817403e2c0d422d52170b8234f899316e10e60c6ebd7de0c3ea099727a8b6ed8e0389b9d2e3cad87b8e7f129091e9840e3120b9aac77f965c21d

    • SSDEEP

      3072:+3BLbpwA+dFGTOxXqS+jK+N1nfBFDR24YYi0Fak7mxqZkO5njIrqokdkun78F:wwnYTOxXV+jFM4c0V7m4d2qokd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks