General

  • Target

    file.exe

  • Size

    353KB

  • Sample

    230414-dsf3bshc7z

  • MD5

    e567aeb73ce7bf997975256590d389d0

  • SHA1

    3f797c94a66592446be7c6740c673f2d804316fc

  • SHA256

    59b6e47cbb8d11735a7de8477ecdf71076238b75f841c188aaafb56e92262721

  • SHA512

    fdc07037de3391d1a647a3ce924ba69035b193a027e7536795de022da4c1b197772969fbc08e2739c7654cdc6a8e5db1ccb525fe52c2f1d1c0c25d06a16a9444

  • SSDEEP

    6144:6lxl9rRDwMdz6XkyLBxp1R7VLcJ2Ofppaz8ugHbbiFt:6PPrCMdWXkyFxp7f/Lsbi

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Targets

    • Target

      file.exe

    • Size

      353KB

    • MD5

      e567aeb73ce7bf997975256590d389d0

    • SHA1

      3f797c94a66592446be7c6740c673f2d804316fc

    • SHA256

      59b6e47cbb8d11735a7de8477ecdf71076238b75f841c188aaafb56e92262721

    • SHA512

      fdc07037de3391d1a647a3ce924ba69035b193a027e7536795de022da4c1b197772969fbc08e2739c7654cdc6a8e5db1ccb525fe52c2f1d1c0c25d06a16a9444

    • SSDEEP

      6144:6lxl9rRDwMdz6XkyLBxp1R7VLcJ2Ofppaz8ugHbbiFt:6PPrCMdWXkyFxp7f/Lsbi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks